Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
39
views
21
references
Top references
cited by
21
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,197
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Cryptographic Hardware and Embedded Systems – CHES 2011
spongent: A Lightweight Hash Function
other
Author(s):
Andrey Bogdanov
,
Miroslav Knežević
,
Gregor Leander
,
Deniz Toz
,
Kerem Varıcı
,
Ingrid Verbauwhede
Publication date
(Print):
2011
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Probing cerebral hemodynamics with BOLD fMRI
Most cited references
21
Record
: found
Abstract
: not found
Book Chapter
: not found
PRESENT: An Ultra-Lightweight Block Cipher
A. Bogdanov
,
L. Knudsen
,
G. Leander
…
(2007)
0
comments
Cited
138
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
Christophe De Cannière
,
Orr Dunkelman
,
Miroslav M. Knežević
(2009)
0
comments
Cited
64
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
HIGHT: A New Block Cipher Suitable for Low-Resource Device
Deukjo Hong
,
Jaechul Sung
,
Seokhie Hong
…
(2006)
0
comments
Cited
51
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2011
Pages
: 312-325
DOI:
10.1007/978-3-642-23951-9_21
SO-VID:
16e54320-4376-4740-8b58-e68e0c6a1b11
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 17
FPGA-Based True Random Number Generation Using Circuit Metastability with Adaptive Feedback Control
pp. 475
Small Public Keys and Fast Verification for $\mathcal{M}\(ultivariate \)\mathcal{Q}$ uadratic Public Key Systems
pp. 49
Improved Collision-Correlation Power Analysis on First Order Protected AES
pp. 63
Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols
pp. 79
Protecting AES with Shamir’s Secret Sharing Scheme
pp. 95
A Fast and Provably Secure Higher-Order Masking of AES S-Box
pp. 124
High-Speed High-Security Signatures
pp. 312
spongent: A Lightweight Hash Function
pp. 326
The LED Block Cipher
pp. 342
Piccolo: An Ultra-Lightweight Blockcipher
Similar content
2,197
Lagrangian Hashing for Compressed Neural Field Representations
Authors:
Shrisudhan Govindarajan
,
Zeno Sambugaro
,
Akhmedkhan
…
Practical Hash Functions for Similarity Estimation and Dimensionality Reduction
Authors:
Mikkel Thorup
,
Mathias Knudsen
,
Søren Dahlgaard
Construction of Slepian-Wolf Source Code and Broadcast Channel Code Based on Hash Property
Authors:
,
See all similar
Cited by
20
Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions
Authors:
Saurabh Singh
,
Pradip Sharma
,
Seo Moon
…
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs
Authors:
Anthony Van Herrewege
,
Stefan Katzenbeisser
,
Roel Maes
…
PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator
Authors:
Roel Maes
,
Anthony Van Herrewege
,
Ingrid Verbauwhede
See all cited by