2014
DOI: 10.1007/978-3-319-12087-4_19
|View full text |Cite
|
Sign up to set email alerts
|

LHash: A Lightweight Hash Function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(24 citation statements)
references
References 33 publications
0
24
0
Order By: Relevance
“…The commonly used hash functions like Message-Digest Algorithm 5 (MD5) and Secure Hash Algorithm 256 (SHA-256) need 8,001 and 10,868 logical gates, respectively [15]. Fortunately, several lightweight hash functions, such as SPONGENT [16], PHOTON [17], Quark [18] and LHash [19], have been introduced, which are able to provide suitable security primitives for resource constrained RFID devices. For instance, the implementation cost of 96-bit LHash is just 817 logical gates [19].…”
Section: Figure 1 Rfid Based Healthcare Systemmentioning
confidence: 99%
“…The commonly used hash functions like Message-Digest Algorithm 5 (MD5) and Secure Hash Algorithm 256 (SHA-256) need 8,001 and 10,868 logical gates, respectively [15]. Fortunately, several lightweight hash functions, such as SPONGENT [16], PHOTON [17], Quark [18] and LHash [19], have been introduced, which are able to provide suitable security primitives for resource constrained RFID devices. For instance, the implementation cost of 96-bit LHash is just 817 logical gates [19].…”
Section: Figure 1 Rfid Based Healthcare Systemmentioning
confidence: 99%
“…-Non-linear Layer: CASH uses the Sbox given in Table 6 of LHASH hash function [16] The ANF of the Sbox is as follows:…”
Section: Internal Transformationmentioning
confidence: 99%
“…Nevertheless, this is not true in lightweight cryptography, where using c=2n is considered as expensive in terms of area as found in PHOTON [13], quark [2,15] and LHash [16].…”
Section: Security Analysis Of Dlp-spongementioning
confidence: 99%
“…Examples of hash function designs based on sponge construction are Keccak [12], PHOTON [13], Spongent [14], quark [15] and LHash [16]. These primitive designs are established based on permutations of many variants.…”
Section: Introductionmentioning
confidence: 99%