Cryptographic hash functions are an omnipresent components in security-critical software and devices; they support, for example, digital signature and data authenticity schemes, mechanisms for key derivation, pseudo-random number generation and so on. A criteria for candidate hash functions in the SHA-3 contest is resistance against side-channel analysis which is a major concern for mobile devices as well. This paper explores the implementation of said candidates on a variant of the Power-Trust platform; our results highlight this representing a flexible solution to power analysis attacks, implying only a modest performance overhead
The National Institute of Standard and Technology (NIST) has suggested different principles for hash...
The Keccak Sponge Function is the winner of the National Institute of Standards and Technology (NIST...
In this paper, the performances of SHA-3 final round candidates along with new versions of other has...
Abstract. Cryptographic hash functions are an omnipresent compo-nents in security-critical software ...
Part 5: Hardware ImplementationInternational audienceCryptographic hash functions are an omnipresent...
A secure cryptographic hashing function should be resistant to three different scenarios: First, a c...
Hashing algorithms are one-way functions that are used in cryptographic protocols as Pseudo Random F...
Side-channel attacks refer to a particular form of cryptanalysis in which sensitive data is revealed...
Digital signatures and message authentication codes are the two most common applications of cryptogr...
A cryptographic hash work is a phenomenal class of hash work that has certain properties which make ...
With the rapid advancement of technologies and proliferation of intelligent devices, conn...
In this note we give an overview on the current state of the SHA-3 candidates. First, we classify al...
In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of vie...
Hash functions are considered key components of nearly all cryptographic protocols, as well as of ma...
Abstract. Keccak is the hash function selected by NIST as the new SHA-3 standard. Keccak is built on...
The National Institute of Standard and Technology (NIST) has suggested different principles for hash...
The Keccak Sponge Function is the winner of the National Institute of Standards and Technology (NIST...
In this paper, the performances of SHA-3 final round candidates along with new versions of other has...
Abstract. Cryptographic hash functions are an omnipresent compo-nents in security-critical software ...
Part 5: Hardware ImplementationInternational audienceCryptographic hash functions are an omnipresent...
A secure cryptographic hashing function should be resistant to three different scenarios: First, a c...
Hashing algorithms are one-way functions that are used in cryptographic protocols as Pseudo Random F...
Side-channel attacks refer to a particular form of cryptanalysis in which sensitive data is revealed...
Digital signatures and message authentication codes are the two most common applications of cryptogr...
A cryptographic hash work is a phenomenal class of hash work that has certain properties which make ...
With the rapid advancement of technologies and proliferation of intelligent devices, conn...
In this note we give an overview on the current state of the SHA-3 candidates. First, we classify al...
In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of vie...
Hash functions are considered key components of nearly all cryptographic protocols, as well as of ma...
Abstract. Keccak is the hash function selected by NIST as the new SHA-3 standard. Keccak is built on...
The National Institute of Standard and Technology (NIST) has suggested different principles for hash...
The Keccak Sponge Function is the winner of the National Institute of Standards and Technology (NIST...
In this paper, the performances of SHA-3 final round candidates along with new versions of other has...