In this chapter we will look at choosing and optimizing cryptographic algorithms, particularly for resource-constrained systems, such as embedded systems. We will look at various strategies for ...
NIST is planning a competition to develop one or more cryptographic 'hash' algorithms to augment and revise the current Secure Hash Standard (Federal Information Processing Standard 180-2). The ...