Download Now Free registration required
Cryptographic hash functions are omnipresent components in security-critical software and devices; they support, for example, digital signature and data authenticity schemes, mechanisms for key derivation, pseudo-random number generation and so on. A criteria for candidate hash functions in the SHA-3 contest is resistance against side-channel analysis which is a major concern for mobile devices as well. This paper explores the implementation of said candidates on a variant of the Power-Trust platform; the results highlight this representing a flexible solution to power analysis attacks, implying only a modest performance overhead.
- Format: PDF
- Size: 247.7 KB