A First-Order Differential Power Analysis Attack on HMAC-SM3
暂无分享,去创建一个
Lihui Wang | Qing Li | Weijun Shan | Limin Guo | Zhimin Zhang | Dan Liu
[1] Christof Paar,et al. DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction , 2004, CHES.
[2] An Wang,et al. Hardware Design and Implementation of SM3 Hash Algorithm for Financial IC Card , 2014, 2014 Tenth International Conference on Computational Intelligence and Security.
[3] William P. Marnane,et al. Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures , 2007, WISA.
[4] Yang Xian-wen. Optimization Design and Implementation of SM3 Algorithm Based on FPGA , 2012 .
[5] Katsuyuki Okeya. Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions , 2006, ACISP.
[6] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[7] Tetsu Iwata,et al. Side Channel Attacks on Message Authentication Codes , 2005, ESAS.