An Evaluation Of Hash Functions On A Power Analysis Resistant Processor Architecture

WISTP'11: Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication(2011)

引用 4|浏览13
暂无评分
摘要
Cryptographic hash functions are an omnipresent component in security-critical software and devices; they support digital signature and data authenticity schemes, mechanisms for key derivation, pseudo-random number generation and so on. A criterion for candidate hash functions in the SHA-3 contest is resistance against side-channel analysis which is a major concern especially for mobile devices. This paper explores the implementation of said candidates on a variant of the Power-Trust platform; our results highlight a flexible solution to power analysis attacks, implying only a modest performance overhead.
更多
查看译文
关键词
Cryptographic hash function,candidate hash function,power analysis attack,side-channel analysis,Power-Trust platform,SHA-3 contest,data authenticity scheme,digital signature,flexible solution,key derivation,power analysis resistant processor
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要