Back to Results
First PageMeta Content
SHA-2 / SHA-1 / NIST hash function competition / HMAC / Keccak / Skein / Crypt / Side channel attack / Computer security / Error detection and correction / Cryptographic hash functions / Cryptography


An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder1 , Marcin Wojcik1 , Stefan Tillich1 , Dan Page1 {hoerder, wojcik, tillich, page}@compsci.bristol.ac.uk Department of Comp
Add to Reading List

Document Date: 2010-12-01 12:22:01


Open Document

File Size: 247,67 KB

Share Result on Facebook

Company

BMW / Hf 1 Hf / IV Hf / the AES / /

/

Facility

Neither SPA / University of Bristol / /

IndustryTerm

embedded and mobile applications / software level / embedded and mobile computing / security-critical devices / mobile and embedded devices / protected cryptographic algorithm / inflexible solution / cryptographic algorithm / software-based platforms / security-critical software / side-channel resistant embedded processor / processor hardware / typical cryptographic algorithms / /

Organization

ASIC / University of Bristol / Department of Computer Science / /

Position

programmer / /

Technology

Encryption / mobile computing / block cipher / ASIC / operating system / scheduling algorithm / typical cryptographic algorithms / digital signature / cryptographic algorithm / side-channel resistant embedded processor / protected cryptographic algorithm / mobile devices / /

SocialTag