Research Article

Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN

Figure 7

Hardware architectures for SHA3-256 (left) and SPONGENT (right) used under the HMAC operation mode to generate MAC tags.