Hash algorithm comparison through a PIC32 microcontroller

4Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper presents a comparative study involving SHA-3 final round candidates along with recent versions of hash algorithms. The proposed comparison between hash functions is performed with respect to cycles per byte and memory space. Tests are also carried out on a PIC32-based application taking into account several input cases, thus resulting in a set of ranked algorithms in terms of their specified metrics. The outcome of this work represents a considerable contribution in data protection and information security in relation to various communication and transmission systems, serving as a handy reference for developers to select an appropriate hash algorithm for their particular use condition.

Cite

CITATION STYLE

APA

Zniti, A., & Ouazzani, N. E. (2023). Hash algorithm comparison through a PIC32 microcontroller. Bulletin of Electrical Engineering and Informatics, 12(4), 2457–2463. https://doi.org/10.11591/eei.v12i4.4982

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free