Side-channel analysis of six SHA-3 candidates
From MaRDI portal
Publication:3583447
DOI10.1007/978-3-642-15031-9_10zbMATH Open1297.94048OpenAlexW1526301524MaRDI QIDQ3583447FDOQ3583447
Authors: Olivier Benoît, Thomas Peyrin
Publication date: 17 August 2010
Published in: Cryptographic Hardware and Embedded Systems, CHES 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-15031-9_10
Recommendations
- A template attack to reconstruct the input of SHA-3 on an 8-bit device
- Side channel cryptanalysis of product ciphers
- Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein
- Performance analysis of the SHA-3 candidates on exotic multi-core architectures
- Differential fault analysis of SHA-3
Cited In (9)
- A template attack to reconstruct the input of SHA-3 on an 8-bit device
- Correlation power analysis and higher-order masking implementation of WAGE
- Correlation power analysis of lightweight block ciphers: from theory to practice
- The NIST SHA-3 Competition: A Perspective on the Final Year
- Arithmetic Addition over Boolean Masking
- Practical aspects of vertical side-channel analyses on HMAC-SHA-2
- Developing a hardware evaluation method for SHA-3 candidates
- Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein
- Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512
This page was built for publication: Side-channel analysis of six SHA-3 candidates
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3583447)