International audienceIn this work, a detailed study of two finalists of the SHA-3 competition from the side-channel analysis point of view is provided. For both functions when used as a MAC, this paper presents detected strategies for performing a power analysis. Besides the classical HMAC mode, two additionally proposed constructions, the envelope MAC for Grøstl and the Skein-MAC for Skein are analyzed. Consequently, examples of software countermeasures thwarting first-order DPA or CPA are given. For the validation of our choices, HMAC-Grøstl, HMAC-Skein as well as the countermeasures were implemented on a 32-bit ARM-based smart card, and power analysis attacks were mounted in practice on both unprotected and protected implementations. Fi...
Side channel attacks (SCAs) have been considered as great threats to modern cryptosystems, including...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
In the field of cryptography, the focus is often placed on security in a mathematical or information...
Abstract—This work1 provides a detailed study of two finalists of the SHA-3 competition from the sid...
In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of vie...
Side-channel attacks refer to a particular form of cryptanalysis in which sensitive data is revealed...
International audienceAs any algorithm manipulating secret data, HMAC is potentially vulnerable to s...
Abstract. Keccak is the hash function selected by NIST as the new SHA-3 standard. Keccak is built on...
The original publication is available at www.springerlink.comInternational audienceIn this paper, we...
Abstract—HMAC algorithm is one of the most famous keyed hash functions, and widely utilized. And SM3...
Digital signatures and message authentication codes are the two most common applications of cryptogr...
Cryptographic hash functions are an omnipresent components in security-critical software and devices...
International audienceSide Channel Analysis (SCA) is a class of attacks that exploits leakage of inf...
Passing messages to soldiers on the battle field, conducting online banking, and downloading files o...
International audienceSide-channel attacks (SCAs) are powerful attacks based on the information obta...
Side channel attacks (SCAs) have been considered as great threats to modern cryptosystems, including...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
In the field of cryptography, the focus is often placed on security in a mathematical or information...
Abstract—This work1 provides a detailed study of two finalists of the SHA-3 competition from the sid...
In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of vie...
Side-channel attacks refer to a particular form of cryptanalysis in which sensitive data is revealed...
International audienceAs any algorithm manipulating secret data, HMAC is potentially vulnerable to s...
Abstract. Keccak is the hash function selected by NIST as the new SHA-3 standard. Keccak is built on...
The original publication is available at www.springerlink.comInternational audienceIn this paper, we...
Abstract—HMAC algorithm is one of the most famous keyed hash functions, and widely utilized. And SM3...
Digital signatures and message authentication codes are the two most common applications of cryptogr...
Cryptographic hash functions are an omnipresent components in security-critical software and devices...
International audienceSide Channel Analysis (SCA) is a class of attacks that exploits leakage of inf...
Passing messages to soldiers on the battle field, conducting online banking, and downloading files o...
International audienceSide-channel attacks (SCAs) are powerful attacks based on the information obta...
Side channel attacks (SCAs) have been considered as great threats to modern cryptosystems, including...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
In the field of cryptography, the focus is often placed on security in a mathematical or information...