Chaining Optimization Methodology: A New SHA-3 Implementation on Low-End Microcontrollers

Since the Keccak algorithm was selected by the US National Institute of Standards and Technology (NIST) as the standard SHA-3 hash algorithm for replacing the currently used SHA-2 algorithm in 2015, various optimization methods have been studied in parallel and hardware environments. However, in a s...

Full description

Bibliographic Details
Main Authors: Young Beom Kim, Taek-Young Youn, Seog Chung Seo
Format: Article
Language:English
Published: MDPI AG 2021-04-01
Series:Sustainability
Subjects:
WSN
Online Access:https://www.mdpi.com/2071-1050/13/8/4324