Towards algorithm agility for wireless sensor networks: Comparison of the portability of selected Hash functions
暂无分享,去创建一个
[1] Yu Sasaki,et al. Finding Preimages of Tiger Up to 23 Steps , 2010, FSE.
[2] Eli Biham,et al. TIGER: A Fast New Hash Function , 1996, FSE.
[3] Vincent Rijmen,et al. Cryptanalysis of the Tiger Hash Function , 2007, ASIACRYPT.
[4] Florian Mendel,et al. Symmetric Cryptography , 2009 .
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] Stéphane Manuel,et al. Classification and generation of disturbance vectors for collision attacks against SHA-1 , 2011, Des. Codes Cryptogr..
[7] Manuel Koschuch,et al. Hash Algorithms for 8051-based Sensornodes , 2012, DCNET/ICE-B/OPTICS.
[8] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.