Side-channel analysis of six SHA-3 candidates
From MaRDI portal
Publication:3583447
Recommendations
- A template attack to reconstruct the input of SHA-3 on an 8-bit device
- Side channel cryptanalysis of product ciphers
- Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein
- Performance analysis of the SHA-3 candidates on exotic multi-core architectures
- Differential fault analysis of SHA-3
Cited in
(9)- Practical aspects of vertical side-channel analyses on HMAC-SHA-2
- Arithmetic Addition over Boolean Masking
- Correlation power analysis and higher-order masking implementation of WAGE
- Correlation power analysis of lightweight block ciphers: from theory to practice
- Developing a hardware evaluation method for SHA-3 candidates
- Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein
- A template attack to reconstruct the input of SHA-3 on an 8-bit device
- The NIST SHA-3 Competition: A Perspective on the Final Year
- Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512
This page was built for publication: Side-channel analysis of six SHA-3 candidates
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3583447)