Back to Results
First PageMeta Content
Hashing / Message authentication codes / Coding theory / HMAC / SHA-2 / MD5 / Key derivation function / Collision attack / SHA-1 / Cryptography / Error detection and correction / Cryptographic hash functions


Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis Réal2,3 , and Frédéric Valette3
Add to Reading List

Document Date: 2009-12-17 12:00:22


Open Document

File Size: 507,31 KB

Share Result on Facebook

City

Rennes / HMAC / Bruz / /

Company

Altera / /

Country

France / /

/

Event

Force Majeure / FDA Phase / /

IndustryTerm

register technology / online stage / message recovery algorithm / important networks / physical device / Internet standards / Internet Key Exchange / security protocols / /

Person

Ai / /

Position

CPA / /

Product

ipad / ZTE C79 Cellular Phone / L2TP / /

ProgrammingLanguage

E / Assembly Language / D / A sharp / C / /

Technology

encryption / register technology / FPGA / radiation / IPsec protocol / message recovery algorithm / 4 Algorithm / VPN / security protocols / secret key / L2TP protocol / simulation / NIOS processor / IPsec protocols / HMAC-SHA1 algorithm / SSL / network protocols / /

URL

http /

SocialTag