Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3

  • Atighehchi K
  • Bonnecaze A
N/ACitations
Citations of this article
23Readers
Mendeley users who have this article in their library.

Abstract

Discussions about the choice of a tree hash mode of operation for a standardization have recently been undertaken. It appears that a single tree mode cannot address adequately all possible uses and specifications of a system. In this paper, we review the tree modes which have been proposed, we discuss their problems and propose solutions. We make the reasonable assumption that communicating systems have different specifications and that software applications are of different types (securing stored content or live-streamed content). Finally, we propose new modes of operation that address the resource usage problem for three representative categories of devices and we analyse their asymptotic behavior.

Cite

CITATION STYLE

APA

Atighehchi, K., & Bonnecaze, A. (2017). Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3. IACR Transactions on Symmetric Cryptology, 212–239. https://doi.org/10.46586/tosc.v2017.i4.212-239

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free