[Resource Topic] 2010/614: An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture

Welcome to the resource topic for 2010/614

Title:
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture

Authors: Simon Hoerder, Marcin Wojcik, Stefan Tillich, Dan Page

Abstract:

Cryptographic hash functions are an omnipresent components in security-critical software and devices; they support, for example, digital signature and data authenticity schemes, mechanisms for key derivation, pseudo-random number generation and so on. A criteria for candidate hash functions in the SHA-3 contest is resistance against side-channel analysis which is a major concern for mobile devices as well. This paper explores the implementation of said candidates on a variant of the Power-Trust platform; our results highlight this representing a flexible solution to power analysis attacks, implying only a modest performance overhead.

ePrint: https://eprint.iacr.org/2010/614

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .