First Full-Fledged Side Channel Attack on HMAC-SHA-2

Author:

Belenky YaacovORCID,Dushar IraORCID,Teper ValeryORCID,Chernyshchyk HennadiiORCID,Azriel LeonidORCID,Kreimer YuryORCID

Publisher

Springer International Publishing

Reference30 articles.

1. ANSSI, Amossys, EDSI, LETI, Lexfo, Oppida, Quarkslab, SERMA, Synacktiv, Thales, Trusted Labs: Inter-CESTI: Methodological and Technical Feedbacks on Hardware Devices Evaluations. Technical report (2020). https://www.sstic.org/2020/presentation/inter-cesti_methodological_and_technical_feedbacks_on_hardware_devices_evaluations/

2. Archambeau, C., Peeters, E., Standaert, F.X., Quisquater, J.J.: Template attacks in principal subspaces. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 1–14. Springer, Heidelberg (2006). https://doi.org/10.1007/11894063_1

3. Belaíd, S., Bettale, L., Dottax, E., Genelle, L., Rondepierre, F.: Differential power analysis of HMAC SHA-1 and HMAC SHA-2 in the hamming weight model. In: Obaidat, M., Holzinger, A., Filipe, J. (eds.) ICETE 2014. CCIS, vol. 554, pp. 363–379. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-25915-4_19

4. BSI: Anwendungshinweise und Interpretationen zum Schema (AIS) 46. Technical report, BSI (2013). https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_46_pdf.pdf?__blob=publicationFile&v=1

5. Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Koç, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13–28. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36400-5_3

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Keyless Entry: Breaking and Entering eMMC RPMB with EMFI;Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks;2024-05-27

2. Practical Aspects of Vertical Side-Channel Analyses on HMAC-SHA-2;Lecture Notes in Computer Science;2024

3. Implementation of a Hash-based Secure Core for Integrity and Authentication of Data in Space Applications on Space-grade FPGAs;2023 IEEE 2nd Industrial Electronics Society Annual On-Line Conference (ONCON);2023-12-08

4. Canonical DPA Attack on HMAC-SHA1/SHA2;Constructive Side-Channel Analysis and Secure Design;2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3