First full-fledged side channel attack on HMAC-SHA-2
From MaRDI portal
Publication:2145284
Recommendations
- Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions
- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions
- A template attack to reconstruct the input of SHA-3 on an 8-bit device
- Improved generic attacks against hash-based MACs and HAIFA
- Improved generic attacks against hash-based MACs and HAIFA
Cites work
- scientific article; zbMATH DE number 1979272 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions
- Chipwhisperer: an open-source platform for hardware embedded security research
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Differential power analysis of XMSS and SPHINCS
- RSA key extraction via low-bandwidth acoustic cryptanalysis
- Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
Cited in
(6)- Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions
- A template attack to reconstruct the input of SHA-3 on an 8-bit device
- Unintended features of APIs: cryptanalysis of incremental HMAC
- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions
- Practical aspects of vertical side-channel analyses on HMAC-SHA-2
- Canonical DPA attack on HMAC-SHA1/SHA2
This page was built for publication: First full-fledged side channel attack on HMAC-SHA-2
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2145284)