DEVELOPMENT OF LIGHTWEIGHT HASH FUNCTION ALGORITHM BASED ON SPONGE CONSTRUCTION FOR CONSTRAINED DEVICES
Security has become one of the most important aspects of application considering the increasing number of cyber threats. Application security can be achieved by implementing conventional cryptography, such as hash function. Hash function has been used widely in many small computing devices, such as...
Saved in:
Main Author: | Widhiara, Benardi |
---|---|
Format: | Theses |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/66700 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Similar Items
-
UDhashing : physical unclonable function-based user-device hash for endpoint authentication
by: Zheng, Yue, et al.
Published: (2021) -
Functional graphs and their applications in generic attacks on iterated hash constructions
by: Bao, Zhenzhen, et al.
Published: (2019) -
Hash function based on block cipher
by: Yi, X., et al.
Published: (2014) -
CRYPTOGRAPHIC HASH FUNCTIONS
by: SARAH NG WEI TING
Published: (2021) -
CRYPTOGRAPHIC HASH FUNCTIONS
by: NG YON TEK,KEVIN
Published: (2021)