2012
DOI: 10.5755/j01.eee.18.10.3069
|View full text |Cite
|
Sign up to set email alerts
|

Energy Consumption of Hash Functions

Abstract: We analyse energy efficiency versus quality characteristics of hashing algorithms in a mobile device and describe methodologies for energy measurement on a Javaenabled smart phone.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
2
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(22 citation statements)
references
References 5 publications
0
22
0
Order By: Relevance
“…In this [8] paper, the authors have analyzed the energy efficiency versus quality characteristics of several hash functions. They perform Avalanche and Chi-square test to analyze the energy usage in Java-enabled smart phone.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this [8] paper, the authors have analyzed the energy efficiency versus quality characteristics of several hash functions. They perform Avalanche and Chi-square test to analyze the energy usage in Java-enabled smart phone.…”
Section: Related Workmentioning
confidence: 99%
“…They perform Avalanche and Chi-square test to analyze the energy usage in Java-enabled smart phone. With the result obtained, the authors propose the best cryptographic and non-cryptographic algorithms that can be used in mobile devices [8].…”
Section: Related Workmentioning
confidence: 99%
“…The security of SHA-1 is higher than MD5 and the energy consumption is only slightly higher than that of MD5 in the energy consumption test of mobile terminal to perform Hash function. So SHA-1 is selected as the hash function [7].…”
Section: A Military Ideas Of Identity Authentication Schemementioning
confidence: 99%
“…References [15], [16] and [17] are early examples with the first generation of sensors. Further, De Meulenaer et al [13] have made measurements for the amount of energy expended per bit in terms of transmitting and receiving and Damasevicius et al [14] have estimated the energy required for computing hashes as well as for encryption. We use these results and with some approximations, make estimates of the energy consumption.…”
Section: B Energy Consumption Estimationmentioning
confidence: 99%