Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3
-
Published:2017-12-15
Issue:
Volume:
Page:212-239
-
ISSN:2519-173X
-
Container-title:IACR Transactions on Symmetric Cryptology
-
language:
-
Short-container-title:ToSC
Author:
Atighehchi Kevin,Bonnecaze Alexis
Abstract
Discussions about the choice of a tree hash mode of operation for a standardization have recently been undertaken. It appears that a single tree mode cannot address adequately all possible uses and specifications of a system. In this paper, we review the tree modes which have been proposed, we discuss their problems and propose solutions. We make the reasonable assumption that communicating systems have different specifications and that software applications are of different types (securing stored content or live-streamed content). Finally, we propose new modes of operation that address the resource usage problem for three representative categories of devices and we analyse their asymptotic behavior.
Publisher
Universitatsbibliothek der Ruhr-Universitat Bochum
Subject
Applied Mathematics,Computational Mathematics,Computer Science Applications,Software
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献