Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
Apr 2, 2020 · Abstract. Since its selection as the winner of the SHA-3 competition, Keccak, with all its variants, has found a large number of applications.
Jun 19, 2020 · We then identify several factors that influence the attack performance, such as the key length, the structure of the Keccak state prior to ...
The first single-trace attack targeting Keccak is presented, based on soft-analytical side-channel attacks and combines template matching with message passing.
As a straight-forward model of Keccak does not yield satisfactory results, we describe several optimizations for the modeling and the message-passing algorithm.
We demonstrate this technique to reconstruct the arbitrary- length inputs of SHA3-512 and some other Keccak sponge functions im- plemented on a 32-bit Cortex-M4 ...
Software accompanying the paper "Single-Trace Attacks on Keccak" which will be published in the IACR Transactions on Cryptographic Hardware and Embedded Systems ...
Jul 2, 2020 · Bibliographic details on Single-Trace Attacks on Keccak.
Mar 9, 2022 · We demonstrate this technique to reconstruct the arbitrary-length inputs of SHA3-512 and some other Keccak sponge functions implemented on a 32-bit Cortex-M4 ...
They also exposed countermeasures against single-trace attacks. They suggest, without proving it, that multiple calls to Keccak, with an input composed of a ...