{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T23:59:58Z","timestamp":1740095998624,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642210396"},{"type":"electronic","value":"9783642210402"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21040-2_11","type":"book-chapter","created":{"date-parts":[[2011,6,3]],"date-time":"2011-06-03T05:11:43Z","timestamp":1307077903000},"page":"160-174","source":"Crossref","is-referenced-by-count":5,"title":["An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture"],"prefix":"10.1007","author":[{"given":"Simon","family":"Hoerder","sequence":"first","affiliation":[]},{"given":"Marcin","family":"W\u00f3jcik","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Tillich","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Page","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X. Wang","year":"2005","unstructured":"Wang, X., Yu, H., Yin, Y.: Efficient Collision Search Attacks on SHA-0. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 1\u201316. Springer, Heidelberg (2005)"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","first-page":"17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X. Wang","year":"2005","unstructured":"Wang, X., Yin, Y., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 17\u201336. Springer, Heidelberg (2005)"},{"key":"11_CR3","unstructured":"National Institute of Standards and Technology (NIST): Secure Hash Standard (SHS). Federal Information Processing Standards Publication 180-2 (August 2002), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips180-2\/fips180-2withchangenotice.pdf"},{"key":"11_CR4","unstructured":"National Institute of Standards and Technology (NIST): Cryptographic Hash Algorithm Competition, \n                    \n                      http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/index.html"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-540-25937-4_24","volume-title":"Fast Software Encryption","author":"P. Rogaway","year":"2004","unstructured":"Rogaway, P., Shrimpton, T.: Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 371\u2013388. Springer, Heidelberg (2004)"},{"key":"11_CR6","unstructured":"Dent, A., Dottax, E.: An overview of side-channel attacks on the asymmetric NESSIE encryption primitives. NESSIE Public Report NES\/DOC\/RHU\/WP5\/020\/a (May 2002), \n                    \n                      https:\/\/www.cosic.esat.kuleuven.be\/nessie\/reports\/phase2\/sidechannels.pdf"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-540-28632-5_15","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"K. Lemke","year":"2004","unstructured":"Lemke, K., Schramm, K., Paar, C.: DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction. In: Joye, M., Quisquater, J.J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 205\u2013219. Springer, Heidelberg (2004), \n                    \n                      http:\/\/dx.doi.org\/10.1007\/978-3-540-28632-5_15"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/11780656_36","volume-title":"Information Security and Privacy","author":"K. Okeya","year":"2006","unstructured":"Okeya, K.: Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 432\u2013443. Springer, Heidelberg (2006)"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-540-77535-5_23","volume-title":"Information Security Applications","author":"R. McEvoy","year":"2008","unstructured":"McEvoy, R., Tunstall, M., Murphy, C., Marnane, W.: Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures. In: Sehun, K., Yung, M., Lee, H.W. (eds.) WISA 2007. LNCS, vol.\u00a04867, pp. 317\u2013332. Springer, Heidelberg (2008) ISBN: 3-540-77534-X"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-540-88625-9_8","volume-title":"Information and Communications Security","author":"P. Gauravaram","year":"2008","unstructured":"Gauravaram, P., Okeya, K.: Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. In: Chen, L., Ryan, M., Wang, G. (eds.) ICICS 2008. LNCS, vol.\u00a05308, pp. 111\u2013127. Springer, Heidelberg (2008)"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-642-04138-9_6","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"P.A. Fouque","year":"2009","unstructured":"Fouque, P.A., Leurent, G., R\u00e9al, D., Valette, F.: Practical Electromagnetic Template Attack on HMAC. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 66\u201380. Springer, Heidelberg (2009), \n                    \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-04138-9_6"},{"key":"11_CR12","unstructured":"Rivest, R.: Side-channel-free timings?, E-Mail to the hash-forum@nist.gov mailing list (November 2010), \n                  \n                    \n                      http:\/\/www.cio.nist.gov\/esd\/emaildir\/lists\/hash-forum\/msg02189.html"},{"key":"11_CR13","unstructured":"Tiri, K., Akmal, M., Verbauwhede, I.: A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards. In: European Solid-State Circuits Conference (ESSCIRC), pp. 403\u2013406 (2002)"},{"key":"11_CR14","unstructured":"Tiri, K., Verbauwhede, I.: A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation. In: Design, Automation, and Test in Europe (DATE), pp. 246\u2013251 (2004)"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-47719-5_11","volume-title":"Information Security and Privacy","author":"D. May","year":"2001","unstructured":"May, D., Muller, H., Smart, N.: Non-deterministic processors. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, pp. 115\u2013129. Springer, Heidelberg (2001)"},{"key":"11_CR16","unstructured":"IAIK, Graz University of Technology: Power-Trust project website, \n                    \n                      http:\/\/www.iaik.tugraz.at\/content\/research\/implementation_attacks\/prj_powertrust\/"},{"key":"11_CR17","first-page":"211","volume-title":"26th Annual Computer Security Applications Conference (ACSAC 2010)","author":"S. Tillich","year":"2010","unstructured":"Tillich, S., Kirschbaum, M., Szekely, A.: SCA-Resistant Embedded Processors\u2014The Next Generation. In: 26th Annual Computer Security Applications Conference (ACSAC 2010), Austin, Texas, USA, December 6-10, pp. 211\u2013220. ACM, New York (2010)"},{"key":"11_CR18","unstructured":"Bernstein, D.: CubeHash specification (2.B.1). Submission to NIST, (Round 2) (2009)"},{"key":"11_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"11_CR20","unstructured":"Aumasson, J.P., Henzen, L., Meier, W., Phan, R.W.: SHA-3 proposal BLAKE. Submission to NIST (2008)"},{"key":"11_CR21","unstructured":"Aumasson, J.P., Henzen, L., Meier, W., Phan, R.W.: OFFICIAL COMMENT: BLAKE tweak. E-Mail to the hash-forum@nist.gov mailing list (November 2010), \n                  \n                    \n                      http:\/\/www.cio.nist.gov\/esd\/emaildir\/lists\/hash-forum\/msg02233.html"},{"key":"11_CR22","unstructured":"Gligoroski, D., Klima, V., Knapskog, S., El-Hadedy, M., Amundsen, J., Mj\u00f8lsnes, S.: Cryptographic Hash Function BLUE MIDNIGHT WISH. Submission to NIST (Round 2) (2009)"},{"key":"11_CR23","unstructured":"Gligoroski, D., Klima, V., Knapskog, S., El-Hadedy, M., Amundsen, J., Mj\u00f8lsnes, S.: Clarification on the rotation constant for the variable M_15. Official Comment to hash-forum@nist.gov (Round 2) (November 2009), \n                  \n                    \n                      http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/Round2\/documents\/BMW_Comments.pdf"},{"key":"11_CR24","unstructured":"Bernstein, D.: CubeHash parameter tweak: 10\u00d7 smaller MAC overhead. Submission to NIST (Round 2) (2010)"},{"key":"11_CR25","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Keccak sponge function family main document. Submission to NIST (Round 2) (2009)"},{"key":"11_CR26","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Keccak specifications. Submission to NIST (Round 2) (2009)"},{"key":"11_CR27","unstructured":"National Institute of Standards and Technology (NIST): Secure Hash Standard (SHS). Federal Information Processing Standards Publication 180-3 (October 2008), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips180-3\/fips180-3_final.pdf"},{"key":"11_CR28","unstructured":"Bresson, E., Canteaut, A., Chevallier-Mames, B., Clavier, C., Fuhr, T., Gouget, A., Icart, T., Misarsky, J.F., Naya-Plasencia, M., Paillier, P., Pornin, T., Reinhard, J.R., Thuillet, C., Videau, M.: Shabal, a Submission to NIST\u2019s Cryptographic Hash Algorithm Competition. Submission to NIST (2008)"},{"key":"11_CR29","unstructured":"Bresson, E., Canteaut, A., Chevallier-Mames, B., Clavier, C., Fuhr, T., Gouget, A., Icart, T., Misarsky, J.F., Naya-Plasencia, M., Paillier, P., Pornin, T., Reinhard, J.R., Thuillet, C., Videau, M.: Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers. Cryptology ePrint Archive, Report 2009\/199 (2009)"},{"key":"11_CR30","unstructured":"Ferguson, N., Lucks, S., Schneier, B., Whiting, D., Bellare, M., Kohno, T., Callas, J., Walker, J.: The Skein Hash Function Family. Submission to NIST (Round 2) (2009)"},{"key":"11_CR31","unstructured":"SPARC International, Inc.: The SPARC Architecture Manual, Version 8, 535 Middlefield Road, Suite 210, Menlo Park, CA 94025, Revision SAV080SI9308 (1992)"},{"key":"11_CR32","unstructured":"eBACS: ECRYPT Benchmarking of Cryptographic Systems: ECRYPT Benchmarking of All Submitted Hashes, \n                    \n                      http:\/\/bench.cr.yp.to\/results-sha3.html"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21040-2_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T13:17:18Z","timestamp":1619788638000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21040-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642210396","9783642210402"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21040-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}