{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:15:22Z","timestamp":1775470522678,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642372872","type":"print"},{"value":"9783642372889","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37288-9_11","type":"book-chapter","created":{"date-parts":[[2013,3,5]],"date-time":"2013-03-05T08:37:43Z","timestamp":1362472663000},"page":"158-172","source":"Crossref","is-referenced-by-count":24,"title":["Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices"],"prefix":"10.1007","author":[{"given":"Josep","family":"Balasch","sequence":"first","affiliation":[]},{"given":"Bari\u015f","family":"Ege","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Eisenbarth","sequence":"additional","affiliation":[]},{"given":"Benoit","family":"G\u00e9rard","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Tim","family":"G\u00fcneysu","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Heyse","sequence":"additional","affiliation":[]},{"given":"St\u00e9phanie","family":"Kerckhof","sequence":"additional","affiliation":[]},{"given":"Fran\u00e7ois","family":"Koeune","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Plos","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"P\u00f6ppelmann","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Regazzoni","sequence":"additional","affiliation":[]},{"given":"Fran\u00e7ois-Xavier","family":"Standaert","sequence":"additional","affiliation":[]},{"given":"Gilles","family":"Van Assche","sequence":"additional","affiliation":[]},{"given":"Ronny","family":"Van Keer","sequence":"additional","affiliation":[]},{"given":"Lo\u00efc","family":"van Oldeneel tot Oldenzeel","sequence":"additional","affiliation":[]},{"given":"Ingo","family":"von Maurich","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"http:\/\/perso.uclouvain.be\/fstandae\/source_codes\/hash_atmel\/"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-15031-9_1","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"J.-P. Aumasson","year":"2010","unstructured":"Aumasson, J.-P., Henzen, L., Meier, W., Naya-Plasencia, M.: Quark: A lightweight hash. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 1\u201315. Springer, Heidelberg (2010)"},{"key":"11_CR3","unstructured":"Aumasson, J.-P., Henzen, L., Meier, W., Naya-Plasencia, M.: QUARK C implementation (2010), \n                    \n                      https:\/\/www.131002.net\/quark\/"},{"key":"11_CR4","unstructured":"Aumasson, J.-P., Henzen, L., Meier, W., Phan, R.C.-W.: SHA-3 proposal BLAKE. Submission to NIST, Round 3 (2010)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Balasch, J., Ege, B., Eisenbarth, T., G\u00e9rard, B., Gong, Z., G\u00fcneysu, T., Heyse, S., Kerckhof, S., Koeune, F., Plos, T., P\u00f6ppelmann, T., Regazzoni, F., Standaert, F.-X., Van Assche, G., Van Keer, R., van Oldeneel\u00a0tot Oldenzeel, L., von Maurich, I.: Compact implementation and performance evaluation of hash functions in attiny devices. Cryptology ePrint Archive, Report 2012\/507 (2012), \n                    \n                      http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-37288-9_11"},{"key":"11_CR6","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge functions. Ecrypt Hash Workshop 2007 (May 2007), also available as public comment to NIST from \n                    \n                      http:\/\/www.csrc.nist.gov\/pki\/HashWorkshop\/Public_Comments\/2007_May.html"},{"key":"11_CR7","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak reference (January 2011), \n                    \n                      http:\/\/keccak.noekeon.org\/"},{"key":"11_CR8","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G., Van Keer, R.: Keccak implementation overview (September 2011), \n                    \n                      http:\/\/keccak.noekeon.org\/"},{"key":"11_CR9","unstructured":"Bogdanov, A., Knezevic, M., Leander, G., Toz, D., Varici, K., Verbauwhede, I.: Spongent: The design space of lightweight cryptographic hashing. IACR Cryptology ePrint Archive, 2011:697 (2011)"},{"key":"11_CR10","unstructured":"Daemen, J., Peeters, M., Van Assche, G., Rijmen, V.: Nessie proposal: NOEKEON (2000), \n                    \n                      http:\/\/gro.noekeon.org\/Noekeon-spec.pdf"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/10721064_26","volume-title":"Smart Card. Research and Applications","author":"J. Daemen","year":"2000","unstructured":"Daemen, J., Rijmen, V.: The block cipher rijndael. In: Quisquater, J.-J., Schneier, B. (eds.) CARDIS 2000. LNCS, vol.\u00a01820, pp. 277\u2013284. Springer, Heidelberg (2000)"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael. Springer-Verlag New York, Inc., Secaucus (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"11_CR13","unstructured":"Daemen, J., Rijmen, V.: AES proposal: Rijndael. In: Proc. First AES Conference (August 1998), Available on-line from the official AES page: \n                    \n                      http:\/\/csrc.nist.gov\/encryption\/aes\/aes_home.htm"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-642-31410-0_11","volume-title":"Progress in Cryptology - AFRICACRYPT 2012","author":"T. Eisenbarth","year":"2012","unstructured":"Eisenbarth, T., Gong, Z., G\u00fcneysu, T., Heyse, S., Indesteege, S., Kerckhof, S., Koeune, F., Nad, T., Plos, T., Regazzoni, F., Standaert, F.-X., van Oldeneel tot Oldenzeel, L.: Compact implementation and performance evaluation of block ciphers in attiny devices. In: Mitrokotsa, A., Vaudenay, S. (eds.) AFRICACRYPT 2012. LNCS, vol.\u00a07374, pp. 172\u2013187. Springer, Heidelberg (2012)"},{"key":"11_CR15","unstructured":"Eisenbarth, T., Heyse, S., von Maurich, I., Poeppelmann, T., Rave, J., Reuber, C., Wild, A.: Evaluation of sha-3 candidates for 8-bit embedded processors. In: The Second SHA-3 Candidate Conference (2010)"},{"key":"11_CR16","unstructured":"Feichtner, J.: \n                    \n                      http:\/\/www.groestl.info\/implementations.html"},{"key":"11_CR17","unstructured":"Ferguson, N., Lucks, S., Schneier, B., Whiting, D., Bellare, M., Kohno, T., Callas, J., Walker, J.: The skein hash function family, version 1.3 (2010), \n                    \n                      http:\/\/www.skein-hash.info\/"},{"key":"11_CR18","unstructured":"Gauravaram, P., Knudsen, L.R., Matusiewicz, K., Mendel, F., Rechberger, C., Schl\u00e4ffer, M., Thomsen, S.S.: Sha-3 proposal gr\u00f8stl, version 2.0.1 (2011), \n                    \n                      http:\/\/www.groestl.info\/"},{"key":"11_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-22792-9_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"J. Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A.: The PHOTON family of lightweight hash functions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol.\u00a06841, pp. 222\u2013239. Springer, Heidelberg (2011)"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/11799313_14","volume-title":"Fast Software Encryption","author":"S. Hirose","year":"2006","unstructured":"Hirose, S.: Some plausible constructions of double-block-length hash functions. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 210\u2013225. Springer, Heidelberg (2006)"},{"issue":"14-15","key":"11_CR21","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1016\/j.ipl.2010.05.009","volume":"110","author":"J. Lee","year":"2010","unstructured":"Lee, J., Park, J.H.: Preimage resistance of lpmkr with r=m-1. Inf. Process. Lett.\u00a0110(14-15), 602\u2013608 (2010)","journal-title":"Inf. Process. Lett."},{"key":"11_CR22","unstructured":"National Institute of Standards and Technology. FIPS 180-3, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180-3. Technical report, U.S. Department of Commerce (October 2008)"},{"key":"11_CR23","unstructured":"NIST. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family. Federal Register Notices 72(212), 62212\u201362220 (November 2007), \n                    \n                      http:\/\/csrc.nist.gov\/groups\/ST\/hash\/index.html"},{"key":"11_CR24","unstructured":"NIST. NIST special publication 800-57, recommendation for key management (revised) (March 2007)"},{"key":"11_CR25","unstructured":"Osvik, D.A.: Fast embedded software hashing. Cryptology ePrint Archive, Report 2012\/156 (2012), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"11_CR26","unstructured":"Otte, D.: Avr-crypto-lib (2009), \n                    \n                      http:\/\/www.das-labor.org\/wiki\/Crypto-avr-lib\/en"},{"key":"11_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-540-85174-5_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"P. Rogaway","year":"2008","unstructured":"Rogaway, P., Steinberger, J.P.: Constructing cryptographic hash functions from fixed-key blockciphers. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.\u00a05157, pp. 433\u2013450. Springer, Heidelberg (2008)"},{"key":"11_CR28","unstructured":"Roland, G.: Efficient implementation of the gr\u00f8stl-256 hash function on an atmega163 microcontroller (June 2009), \n                    \n                      http:\/\/groestl.info\/groestl-0-8bit.pdf"},{"key":"11_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/978-3-540-70583-3_52","volume-title":"Automata, Languages and Programming","author":"T. Shrimpton","year":"2008","unstructured":"Shrimpton, T., Stam, M.: Building a collision-resistant compression function from non-compressing primitives. In: Aceto, L., Damg\u00e5rd, I., Goldberg, L.A., Halld\u00f3rsson, M.M., Ing\u00f3lfsd\u00f3ttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol.\u00a05126, pp. 643\u2013654. Springer, Heidelberg (2008)"},{"key":"11_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/11733447_16","volume-title":"Smart Card Research and Advanced Applications","author":"F.-X. Standaert","year":"2006","unstructured":"Standaert, F.-X., Piret, G., Gershenfeld, N., Quisquater, J.-J.: SEA: A scalable encryption algorithm for small embedded applications. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol.\u00a03928, pp. 222\u2013236. Springer, Heidelberg (2006)"},{"key":"11_CR31","unstructured":"Walter, J.: Fhreefish (skein implementation) website, \n                    \n                      http:\/\/www.syntax-k.de\/projekte\/fhreefish\/"},{"key":"11_CR32","unstructured":"Wenzel-Benner, C., Gr\u00e4f, J., Pham, J., Kaps, J.-P.: XBX benchmarking results January 2012. In: Third SHA-3 Candidate Conference (March 2012), \n                    \n                      http:\/\/xbx.das-labor.org\/trac\/wiki\/r2012platforms_atmega1284p_16mhz"},{"key":"11_CR33","unstructured":"Wu, H.: JH Documentation Website, \n                    \n                      http:\/\/www3.ntu.edu.sg\/home\/wuhj\/research\/jh\/"},{"key":"11_CR34","unstructured":"Wu, H.: The Hash Function JH (January 2011), \n                    \n                      http:\/\/www3.ntu.edu.sg\/home\/wuhj\/research\/jh\/"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37288-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T10:33:22Z","timestamp":1557570802000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37288-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642372872","9783642372889"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37288-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}