An evaluation of hash functions on a power analysis resistant processor architecture

Simon Hoerder, Marcin Wojcik, Stefan Tillich, Daniel Page

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Abstract

Cryptographic hash functions are an omnipresent component in security-critical software and devices; they support digital signature and data authenticity schemes, mechanisms for key derivation, pseudo-random number generation and so on. A criterion for candidate hash functions in the SHA3 contest is resistance against side-channel analysis which is a major concern especially for mobile devices. This paper explores the implementation of said candidates on a variant of the Power-Trust platform; our results highlight a flexible solution to power analysis attacks, implying only a modest performance overhead.
Translated title of the contributionAn Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture
Original languageEnglish
Title of host publicationWorkshop in Information Security Theory and Practice - WISTP 2011
PublisherSpringer Berlin Heidelberg
Pages160-174
Volume6633
Publication statusPublished - 2011

Fingerprint Dive into the research topics of 'An evaluation of hash functions on a power analysis resistant processor architecture'. Together they form a unique fingerprint.

  • Cite this

    Hoerder, S., Wojcik, M., Tillich, S., & Page, D. (2011). An evaluation of hash functions on a power analysis resistant processor architecture. In Workshop in Information Security Theory and Practice - WISTP 2011 (Vol. 6633, pp. 160-174). Springer Berlin Heidelberg.