2016
DOI: 10.3837/tiis.2017.01.028
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of the Whirlpool Hash Function in the Cloud of Things

Abstract: With the advancement and deployment of leading-edge telecommunication technologies for sensing and collecting, computing related information, Cloud of Things (CoTs) has emerged as a typical application platform that is envisioned to revolutionize the daily activities of human society, such as intelligent transportation, modern logistics, food safety, environmental monitoring, etc. To avoid any possible malicious attack and resource abuse, employing hash functions is widely recognized as one of the most effecti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 27 publications
(29 reference statements)
0
1
0
Order By: Relevance
“…In 2005, Wang used new analysis methods to propose collision attacks on MD4, RIPEMD, MD5, SHA0, and SHA1 [11][12][13][14], prompting the industry to re-evaluate the security of the MD and SHA series. Since that time, there have been continuous attacks on popular hash functions, making it an urgent task to develop more secure and efficient alternatives [15][16][17][18][19].…”
Section: Related Workmentioning
confidence: 99%
“…In 2005, Wang used new analysis methods to propose collision attacks on MD4, RIPEMD, MD5, SHA0, and SHA1 [11][12][13][14], prompting the industry to re-evaluate the security of the MD and SHA series. Since that time, there have been continuous attacks on popular hash functions, making it an urgent task to develop more secure and efficient alternatives [15][16][17][18][19].…”
Section: Related Workmentioning
confidence: 99%