메뉴 건너뛰기




Volumn 6917 LNCS, Issue , 2011, Pages 312-325

Spongent: A lightweight hash function

Author keywords

Hash function; lightweight cryptography; low cost cryptography; low power design; present; RFID; sponge construction; spongent

Indexed keywords

LIGHT-WEIGHT CRYPTOGRAPHY; LOW-POWER DESIGN; PREIMAGES; PRESENT; SECURITY ANALYSIS; SECURITY LEVEL; SPONGENT;

EID: 80053502266     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-23951-9_21     Document Type: Conference Paper
Times cited : (298)

References (28)
  • 3
    • 44449147491 scopus 로고    scopus 로고
    • On the Indifferentiability of the Sponge Construction
    • Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
    • Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: On the Indifferentiability of the Sponge Construction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 181-197. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 181-197
    • Bertoni, G.1    Daemen, J.2    Peeters, M.3    Assche, G.V.4
  • 5
    • 37149045263 scopus 로고    scopus 로고
    • PRESENT: An Ultra-Lightweight Block Cipher
    • Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
    • Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450-466. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4727 , pp. 450-466
    • Bogdanov, A.1    Knudsen, L.R.2    Leander, G.3    Paar, C.4    Poschmann, A.5    Robshaw, M.J.B.6    Seurin, Y.7    Vikkelsoe, C.8
  • 6
    • 51049092732 scopus 로고    scopus 로고
    • Hash Functions and RFID Tags: Mind the Gap
    • Oswald, E., Rohatgi, P. (eds.) CHES 2008. Springer, Heidelberg
    • Bogdanov, A., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y.: Hash Functions and RFID Tags: Mind the Gap. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 283-299. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5154 , pp. 283-299
    • Bogdanov, A.1    Leander, G.2    Paar, C.3    Poschmann, A.4    Robshaw, M.J.B.5    Seurin, Y.6
  • 7
    • 77952047730 scopus 로고    scopus 로고
    • Linear Cryptanalysis of Reduced-Round PRESENT
    • Pieprzyk, J. (ed.) CT-RSA 2010. Springer, Heidelberg
    • Cho, J.Y.: Linear Cryptanalysis of Reduced-Round PRESENT. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 302-317. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5985 , pp. 302-317
    • Cho, J.Y.1
  • 8
    • 67650119051 scopus 로고    scopus 로고
    • A Statistical Saturation Attack against the Block Cipher PRESENT
    • Fischlin, M. (ed.) CT-RSA 2009. Springer, Heidelberg
    • Collard, B., Standaert, F.-X.: A Statistical Saturation Attack against the Block Cipher PRESENT. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 195-210. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5473 , pp. 195-210
    • Collard, B.1    Standaert, F.-X.2
  • 10
    • 33750241980 scopus 로고    scopus 로고
    • Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
    • Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. Springer, Heidelberg
    • De Cannière, C.: Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 171-186. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4176 , pp. 171-186
    • De Cannière, C.1
  • 11
    • 70350589237 scopus 로고    scopus 로고
    • KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers
    • Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
    • De Cannière, C., Dunkelman, O., Knežević, M.: KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 272-288. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5747 , pp. 272-288
    • De Cannière, C.1    Dunkelman, O.2    Knežević, M.3
  • 14
    • 84886703527 scopus 로고    scopus 로고
    • Grain: A stream cipher for constrained environments
    • Hell, M., Johansson, T., Meier, W.: Grain: a stream cipher for constrained environments. IJWMC 2(1), 86-93 (2007)
    • (2007) IJWMC , vol.2 , Issue.1 , pp. 86-93
    • Hell, M.1    Johansson, T.2    Meier, W.3
  • 17
    • 78650114205 scopus 로고    scopus 로고
    • A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications
    • Ors Yalcin, S.B. (ed.) RFIDSec 2010. Springer, Heidelberg
    • Kavun, E., Yalcin, T.: A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 258-269. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6370 , pp. 258-269
    • Kavun, E.1    Yalcin, T.2
  • 18
    • 38149136484 scopus 로고    scopus 로고
    • Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing
    • Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. Springer, Heidelberg
    • Kim, M., Ryou, J.: Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 375-385. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4861 , pp. 375-385
    • Kim, M.1    Ryou, J.2
  • 19
    • 67650146012 scopus 로고    scopus 로고
    • Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing
    • Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. Springer, Heidelberg
    • Kim, M., Ryou, J., Jun, S.: Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. In: Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. LNCS, vol. 5487, pp. 240-252. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5487 , pp. 240-252
    • Kim, M.1    Ryou, J.2    Jun, S.3
  • 21
    • 37149033689 scopus 로고    scopus 로고
    • New Lightweight des Variants
    • Biryukov, A. (ed.) FSE 2007. Springer, Heidelberg
    • Leander, G., Paar, C., Poschmann, A., Schramm, K.: New Lightweight DES Variants. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 196-210. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4593 , pp. 196-210
    • Leander, G.1    Paar, C.2    Poschmann, A.3    Schramm, K.4
  • 22
    • 33744929155 scopus 로고    scopus 로고
    • MCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors
    • Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. Springer, Heidelberg
    • Lim, C.H., Korkishko, T.: mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 243-258. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3786 , pp. 243-258
    • Lim, C.H.1    Korkishko, T.2
  • 23
    • 80053484578 scopus 로고    scopus 로고
    • CHES 2010
    • Springer, Heidelberg
    • Mangard, S., Standaert, F.-X. (eds.): CHES 2010. LNCS, vol. 6225. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6225
    • Mangard, S.1    Standaert, F.-X.2
  • 24
    • 70350398631 scopus 로고    scopus 로고
    • The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
    • Dunkelman, O. (ed.) FSE 2009. Springer, Heidelberg
    • Mendel, F., Rechberger, C., Schläffer, M., Thomsen, S.S.: The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 260-276. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5665 , pp. 260-276
    • Mendel, F.1    Rechberger, C.2    Schläffer, M.3    Thomsen, S.S.4
  • 25
    • 76549118066 scopus 로고    scopus 로고
    • New Stream Cipher Designs
    • Springer, Heidelberg
    • Robshaw, M.J.B., Billet, O. (eds.): New Stream Cipher Designs. LNCS, vol. 4986. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4986
    • Robshaw, M.J.B.1    Billet, O.2
  • 28
    • 18144420462 scopus 로고    scopus 로고
    • Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard
    • Yang, B., Wu, K., Karri, R.: Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard. In: International Test Conference, pp. 339-344 (2004)
    • (2004) International Test Conference , pp. 339-344
    • Yang, B.1    Wu, K.2    Karri, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.