Back to Results
First PageMeta Content
Preimage attack / ICE / SHA-2 / SHA-1 / Hash function / VEST / Block cipher / Grøstl / Collision resistance / Cryptography / Error detection and correction / Cryptographic hash functions


SPONGENT: The Design Space of Lightweight Cryptographic Hashing Andrey Bogdanov1 , Miroslav Kneˇzevi´c1,2 , Gregor Leander3 , Deniz Toz1 , Kerem Varıcı1 , and Ingrid Verbauwhede1 1
Add to Reading List

Document Date: 2011-12-21 12:38:00


Open Document

File Size: 945,41 KB

Share Result on Facebook

City

Leuven / Permutation / /

Company

Group 4 63626160 63 63473115 Group / NXP Semiconductors / GE / /

Country

Belgium / /

/

Facility

Technical University / /

IndustryTerm

security applications / cryptographic protocols / time-area product / sensor networks / exhaustive hardware / crucial applications / fore and standard algorithms / online security / prominent security applications / implementable cryptographic algorithms / constrained applications / security protocols / tailored lightweight cryptographic algorithms / branch-and-bound search / /

Organization

Technical University of Denmark / ASIC / Katholieke Universiteit Leuven / /

Person

Miroslav Kne / /

Position

Colonel / bit permutation pLayer / feed-forward / /

Technology

cryptography / ASIC / tailored lightweight cryptographic algorithms / RFID security protocols / block cipher / RFID protocols / efficiently implementable cryptographic algorithms / /

SocialTag