Back to Results
First PageMeta Content
NIST hash function competition / Hashing / Message authentication codes / Keccak / SHA-2 / HMAC / SHA-1 / Skein / JH / Error detection and correction / Cryptography / Cryptographic hash functions


SHA-3 Conference, March 2012, Side Channel Analysis of the SHA-3 Finalists
Add to Reading List

Document Date: 2012-05-21 15:22:44


Open Document

File Size: 2,46 MB

Share Result on Facebook

City

Hash / /

Company

Pearson / Hp / Knudsen / the AES / /

/

Facility

National Institute of Standards and Technology / Fraunhofer Institute / /

IndustryTerm

actual target device / target devices / cryptographic algorithms / computing / secure hashing algorithm / informa tion technology / /

NaturalFeature

Keccak Operations Side channel / Skein-MAC Side channel / Side Channel Attacks Side channel / /

Organization

National Institute of Standards and Technology / OP AD / US Federal Reserve / Integrated Circuits and Systems Lab / Fraunhofer Institute for Secure Information Technology / /

Person

Skein / Ai / Michael Kasper / Marc St¨ottinger / /

Position

Hb / mp / candidate / /

Product

iRiver H10 Portable Audio Device / /

ProvinceOrState

JH-HMAC / /

Technology

cryptography / Information Technology / block cipher / ing algorithm / informa tion technology / secure hashing algorithm / Integrated Circuits / /

SocialTag