Welcome to the resource topic for 2010/447
Title:
Side-channel Analysis of Six SHA-3 Candidates
Authors: Olivier Benoit, Thomas Peyrin
Abstract:In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choice of selection functions to perform the attack. Depending on their inherent structure and the internal primitives used (Sbox, addition or XOR), some schemes are more prone to side channel analysis than others, as shown by our simulations.
ePrint: https://eprint.iacr.org/2010/447
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .