Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Genelle, Laurie"'
Publikováno v:
SECRYPT 2013-10th International Conference on Security and Cryptography
SECRYPT 2013-10th International Conference on Security and Cryptography, Jul 2013, Reykjavik, Iceland
SECRYPT 2013-10th International Conference on Security and Cryptography, Jul 2013, Reykjavik, Iceland
International audience; As any algorithm manipulating secret data, HMAC is potentially vulnerable to side channel attacks. In 2007, McEvoy et al. proposed a differential power analysis attack against HMAC instantiated with hash functions from the SHA
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::fe2202dbf7804c7bed2533c3f8213f1e
https://inria.hal.science/hal-00872410
https://inria.hal.science/hal-00872410
Publikováno v:
AFRICACRYPT 2011-4th International Conference on Cryptology in Africa
AFRICACRYPT 2011-4th International Conference on Cryptology in Africa, Jul 2011, Dakar, Senegal. pp.153-169
AFRICACRYPT 2011-4th International Conference on Cryptology in Africa, Jul 2011, Dakar, Senegal. pp.153-169
International audience; Side Channel Analysis (SCA) is a class of attacks that exploit leakage of information from a cryptographic implementation during execution. To thwart it, masking is a common strategy that aims at hiding correlation between the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::6ba5e5e70d66ce084b111442b3d410d9
https://hal.archives-ouvertes.fr/hal-00639181
https://hal.archives-ouvertes.fr/hal-00639181
Publikováno v:
E-Business & Telecommunications: 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers; 2015, p363-379, 17p
Publikováno v:
Constructive Side-Channel Analysis & Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers; 2014, p129-143, 15p
Publikováno v:
Cryptographic Hardware & Embedded Systems - CHES 2011; 2011, p240-255, 16p
Publikováno v:
Applied Cryptography & Network Security (9783642137075); 2010, p200-217, 18p