An Implementation of an SHA-3 Hash Function Validation Program and Hash Algorithm on 16bit-UICC 


Vol. 41,  No. 11, pp. 885-891, Nov.  2014


PDF

  Abstract

A hash function is an essential cryptographic algorithm primitive that is used to provide integrity to many applications such as message authentication codes and digital signatures. In this paper, we introduce a concept and test method for a Cryptographic Algorithm Validation Program (CAVP). Also, we design an SHA-3 CAVP program and implement an SHA-3 algorithm in 16bit-UICC. Finally, we compare the efficiency of SHA-3 with SHA-2 and evaluate the exellence of the SHA-3 algorithm.


  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

H. Lee, D. Hong, H. Kim, C. Seo, K. Park, "An Implementation of an SHA-3 Hash Function Validation Program and Hash Algorithm on 16bit-UICC," Journal of KIISE, JOK, vol. 41, no. 11, pp. 885-891, 2014. DOI: .


[ACM Style]

Hee-Woong Lee, Dowon Hong, Hyun-il Kim, ChangHo Seo, and Kishik Park. 2014. An Implementation of an SHA-3 Hash Function Validation Program and Hash Algorithm on 16bit-UICC. Journal of KIISE, JOK, 41, 11, (2014), 885-891. DOI: .


[KCI Style]

이희웅, 홍도원, 김현일, 서창호, 박기식, "SHA-3 해시 함수 검정 프로그램과 16bit-UICC 용 SHA-3 구현," 한국정보과학회 논문지, 제41권, 제11호, 885~891쪽, 2014. DOI: .


[Endnote/Zotero/Mendeley (RIS)]  Download


[BibTeX]  Download



Search




Journal of KIISE

  • ISSN : 2383-630X(Print)
  • ISSN : 2383-6296(Electronic)
  • KCI Accredited Journal

Editorial Office

  • Tel. +82-2-588-9240
  • Fax. +82-2-521-1352
  • E-mail. chwoo@kiise.or.kr