Abstract. Cryptographic hash functions are an omnipresent compo-nents in security-critical software and devices; they support, for exam-ple, digital signature and data authenticity schemes, mechanisms for key derivation, pseudo-random number generation and so on. A criteria for candidate hash functions in the SHA-3 contest is resistance against side-channel analysis which is a major concern for mobile devices as well. This paper explores the implementation of said candidates on a variant of the Power-Trust platform; our results highlight this representing a flexible solution to power analysis attacks, implying only a modest performance overhead.
The National Institute of Standard and Technology (NIST) has suggested different principles for hash...
Abstract. The NIST hash function competition to design a new crypto-graphic hash standard ‘SHA-3 ’ i...
The Keccak Sponge Function is the winner of the National Institute of Standards and Technology (NIST...
Abstract. Cryptographic hash functions are an omnipresent compo-nent in security-critical software a...
Part 5: Hardware ImplementationInternational audienceCryptographic hash functions are an omnipresent...
Digital signatures and message authentication codes are the two most common applications of cryptogr...
Side-channel attacks refer to a particular form of cryptanalysis in which sensitive data is revealed...
Abstract. Keccak is the hash function selected by NIST as the new SHA-3 standard. Keccak is built on...
SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of ThingsRecently, we...
This paper describes the study of cryptographic hash functions, one of the most important classes of...
Cryptographic devices produce not only the output data but also some additional information like pow...
A secure cryptographic hashing function should be resistant to three different scenarios: First, a c...
Abstract:- The main applications of the hash functions are met in the fields of communication integr...
Side Channel Attacks (SCA) exploit weaknesses in implementations of cryptographic functions resultin...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
The National Institute of Standard and Technology (NIST) has suggested different principles for hash...
Abstract. The NIST hash function competition to design a new crypto-graphic hash standard ‘SHA-3 ’ i...
The Keccak Sponge Function is the winner of the National Institute of Standards and Technology (NIST...
Abstract. Cryptographic hash functions are an omnipresent compo-nent in security-critical software a...
Part 5: Hardware ImplementationInternational audienceCryptographic hash functions are an omnipresent...
Digital signatures and message authentication codes are the two most common applications of cryptogr...
Side-channel attacks refer to a particular form of cryptanalysis in which sensitive data is revealed...
Abstract. Keccak is the hash function selected by NIST as the new SHA-3 standard. Keccak is built on...
SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of ThingsRecently, we...
This paper describes the study of cryptographic hash functions, one of the most important classes of...
Cryptographic devices produce not only the output data but also some additional information like pow...
A secure cryptographic hashing function should be resistant to three different scenarios: First, a c...
Abstract:- The main applications of the hash functions are met in the fields of communication integr...
Side Channel Attacks (SCA) exploit weaknesses in implementations of cryptographic functions resultin...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
The National Institute of Standard and Technology (NIST) has suggested different principles for hash...
Abstract. The NIST hash function competition to design a new crypto-graphic hash standard ‘SHA-3 ’ i...
The Keccak Sponge Function is the winner of the National Institute of Standards and Technology (NIST...