2022
DOI: 10.1016/j.future.2021.09.042
|View full text |Cite
|
Sign up to set email alerts
|

SHA 3 and Keccak variants computation speeds on constrained devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…The reason why we only used this board for our measurements is because the behavior of the cryptographic primitives used is the same for the different ARM Cortex-M architectures, as shown for example in [ 19 ]. Timing measurements are made using the Data Watchpoint and Trace (DWT) unit of the microcontroller.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…The reason why we only used this board for our measurements is because the behavior of the cryptographic primitives used is the same for the different ARM Cortex-M architectures, as shown for example in [ 19 ]. Timing measurements are made using the Data Watchpoint and Trace (DWT) unit of the microcontroller.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Enhancing the performance of a KECCAK circuit implemented in embedded circuits is a significant challenge. Currently, the KECCAK algorithm is used in a wide range of applications requiring high security, such as smart cards and mobile communication [ 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 ]. Consequently, there is a need to enhance the KECCAK algorithm’s resilience against multiple physical attacks, such as fault attacks.…”
Section: Introductionmentioning
confidence: 99%
“…The Keccak algorithm is a widely utilized cryptographic hash function that plays a crucial role in ensuring data privacy and maintaining the integrity of data exchange in various daily systems. However, there is an ongoing challenge in enhancing the performance of Keccak's circuit implementation, particularly in the context of embedded systems [14,15].…”
Section: Introductionmentioning
confidence: 99%