Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/4514
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHammad, Baraa Tareq-
dc.contributor.authorJamil, Norziana-
dc.contributor.authorRusli, Mohd Ezanee-
dc.contributor.authorZ`aba, Muhammad Reza-
dc.date.accessioned2022-10-21T13:13:32Z-
dc.date.available2022-10-21T13:13:32Z-
dc.date.issued2017-07-
dc.identifier.issn2229-5518-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/4514-
dc.description.abstractLightweight cryptography is developed to enhance the security level in pervasive computing applications such as those characterized by smart but resource-constrained devices. The two main primitives of lightweight symmetric cryptographic are lightweight block cipher and lightweight hash algorithm. In this paper, a comprehensive survey of some lightweight cryptographic hash functions will be described from both hardware and software perspectives. Apart from covering the analyses of these algorithms, the differences of these primitives in terms of throughput, number of cycle, comprehensive area, power and energy will be outlined. We will provide a classification of these lightweight hash functions as wellen_US
dc.language.isoenen_US
dc.publisherInternational Journal of Scientific & Engineering Researchen_US
dc.relation.ispartofseries8;7-
dc.subjectLightweight Cryptographyen_US
dc.subjectHash Functionen_US
dc.subjectResource-Constraineden_US
dc.titleA survey of Lightweight Cryptographic Hash Functionen_US
dc.typeArticleen_US
Appears in Collections:قسم نظم المعلومات

Files in This Item:
File Description SizeFormat 
A-survey-of-Lightweight-Cryptographic-Hash-Function.pdf867.55 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.