An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions
From MaRDI portal
Publication:5458227
DOI10.1007/978-3-540-77026-8_31zbMath1153.94380OpenAlexW1486712081MaRDI QIDQ5458227
Praveen Gauravaram, Katsuyuki Okeya
Publication date: 11 April 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77026-8_31
Related Items (4)
First full-fledged side channel attack on HMAC-SHA-2 ⋮ Некоторые методы анализа функций хэширования и их применение к алгоритму ГОСТ Р 34.11-94 ⋮ An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions ⋮ Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On the Security of Two MAC Algorithms
- Keying Hash Functions for Message Authentication
- On the security of iterated message authentication codes
- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions
- Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions
- One Way Hash Functions and DES
This page was built for publication: An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions