Scientific Research An Academic Publisher
OPEN ACCESS
Add your e-mail address to receive free newsletters from SCIRP.
Select Journal AA AAD AAR AASoci AAST ABB ABC ABCR ACES ACS ACT AD ADR AE AER AHS AID AiM AIT AJAC AJC AJCC AJCM AJIBM AJMB AJOR AJPS ALAMT ALC ALS AM AMI AMPC ANP APD APE APM ARS ARSci AS ASM BLR CC CE CellBio ChnStd CM CMB CN CRCM CS CSTA CUS CWEEE Detection EMAE ENG EPE ETSN FMAR FNS GEP GIS GM Graphene GSC Health IB ICA IIM IJAA IJAMSC IJCCE IJCM IJCNS IJG IJIDS IJIS IJMNTA IJMPCERO IJNM IJOC IJOHNS InfraMatics JACEN JAMP JASMI JBBS JBCPR JBiSE JBM JBNB JBPC JCC JCDSA JCPT JCT JDAIP JDM JEAS JECTC JEMAA JEP JFCMV JFRM JGIS JHEPGC JHRSS JIBTVA JILSA JIS JMF JMGBND JMMCE JMP JPEE JQIS JSBS JSEA JSEMAT JSIP JSS JSSM JST JTR JTST JTTs JWARP LCE MC ME MI MME MNSMS MPS MR MRC MRI MSA MSCE NJGC NM NR NS OALib OALibJ ODEM OJA OJAB OJAcct OJAnes OJAP OJApo OJAppS OJAPr OJAS OJBD OJBIPHY OJBM OJC OJCB OJCD OJCE OJCM OJD OJDer OJDM OJE OJEE OJEM OJEMD OJEpi OJER OJF OJFD OJG OJGas OJGen OJI OJIC OJIM OJINM OJL OJM OJMC OJMetal OJMH OJMI OJMIP OJML OJMM OJMN OJMP OJMS OJMSi OJN OJNeph OJO OJOG OJOGas OJOp OJOph OJOPM OJOTS OJPathology OJPC OJPChem OJPed OJPM OJPP OJPS OJPsych OJRA OJRad OJRD OJRM OJS OJSS OJSST OJST OJSTA OJTR OJTS OJU OJVM OPJ POS PP PST PSYCH SAR SCD SGRE SM SN SNL Soft SS TEL TI UOAJ VP WET WJA WJCD WJCMP WJCS WJET WJM WJNS WJNSE WJNST WJV WSN YM
More>>
M. Feldhofer and C. Rechberger, “A Case against Currently Used Hash Functions in RFID Protocols,” Workshop on RFID Security (IS’ 06), Graz, 13-14 July 2006, pp. 372-381.
has been cited by the following article:
TITLE: Hardware Performance Evaluation of SHA-3 Candidate Algorithms
AUTHORS: Yaser Jararweh, Lo’ai Tawalbeh, Hala Tawalbeh, Abidalrahman Moh’d
KEYWORDS: Information Security; Secure Hash Algorithm (SHA); Hardware Performance; FPGA
JOURNAL NAME: Journal of Information Security, Vol.3 No.2, April 26, 2012
ABSTRACT: Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National Institute of Standards and Technology (NIST), held a competition of three rounds to replace SHA1 and SHA2 with the new SHA-3, to ensure long term robustness of hash functions. In this paper, we present a comprehensive hardware evaluation for the final round SHA-3 candidates. The main goal of providing the hardware evaluation is to: find the best algorithm among them that will satisfy the new hashing algorithm standards defined by the NIST. This is based on a comparison made between each of the finalists in terms of security level, throughput, clock frequancey, area, power consumption, and the cost. We expect that the achived results of the comparisons will contribute in choosing the next hashing algorithm (SHA-3) that will support the security requirements of applications in todays ubiquitous and pervasive information infrastructure.
Related Articles:
A Security System for Kindergarten School Using RFID Technology
Salma Nazia Rahman, Shikder Shafiul Bashar, Md. Abdullah Al Mahmud, Md. Sazal Miah, A. H. M. Zadidul Karim, Maliha Marium
DOI: 10.4236/jcc.2019.74003 777 Downloads 2,201 Views Citations
Pub. Date: April 16, 2019
Research on the Security Monitoring of the Amusement Ride of Tourist Sites Based on RFID
Jian SHANGGUAN, Yingchun LV, Mu ZHANG
DOI: 10.4236/wsn.2010.21012 6,367 Downloads 10,247 Views Citations
Pub. Date: January 13, 2010
An Introduction to RFID Technology
Sanjay Ahuja, Pavan Potti
DOI: 10.4236/cn.2010.23026 21,113 Downloads 35,984 Views Citations
Pub. Date: September 10, 2010
RFID Applications: Prospects and Challenges in Bangladesh
Abdul Kadar Muhammad Masum, Faruk Bhuiyan, Kazi Golam Azam
DOI: 10.4236/jis.2013.42009 5,685 Downloads 8,883 Views Citations
Pub. Date: April 23, 2013
Effects of RFID in Retailing on Customer Trust
Hsiaoping Yeh
DOI: 10.4236/jssm.2013.62014 3,926 Downloads 6,534 Views Citations
Pub. Date: June 7, 2013