2020 IEEE International Conference on Smart Cloud (SmartCloud) 2020
DOI: 10.1109/smartcloud49737.2020.00025
|View full text |Cite
|
Sign up to set email alerts
|

Reliable SoC Design and Implementation of SHA-3-HMAC Algorithm with Attack Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Secure storage practices, including encryption and access control measures, are applied to voting data, ensuring protection against unauthorized access and tampering. The use of cryptographic hash functions creates a chain of custody for voting data, emphasizing established standards like SHA-256 for data security within the university's e-voting systems [23].…”
Section: Signature and Hashmentioning
confidence: 99%
“…Secure storage practices, including encryption and access control measures, are applied to voting data, ensuring protection against unauthorized access and tampering. The use of cryptographic hash functions creates a chain of custody for voting data, emphasizing established standards like SHA-256 for data security within the university's e-voting systems [23].…”
Section: Signature and Hashmentioning
confidence: 99%
“…Due to their nature, such attacks take the name Side-Channel Attacks (SCAs), and Figure 3 SCAs are widely documented in the literature and constitute one of the hottest topics in the cybersecurity field. An exhaustive and systematic review of SCAs can be found in [44][45][46], while [47][48][49][50][51][52][53][54][55][56][57][58][59][60][61][62][63] report several examples of the most diffused categories of attacks that exploit the physical implementation of a device, which are listed below:…”
Section: Rotmentioning
confidence: 99%
“…Power analysis [53][54][55][56][57][58][59][60][61]64,65]: This family of attacks is one of the most effective on both hardware and software implementations, and it exploits the power consumption of underlying physical circuits. Concerning the software case, if each opcode of the instruction set architecture can be associated with a different and specific power trace shape, then the series of operations performed by a routine is revealed; on the hardware side, data dependencies over different power traces can be analyzed to recover secret information.…”
mentioning
confidence: 99%
“…More importantly, the introduced errors result in an incorrect KECCAK state, rendering the integrity message output untrustworthy. So far, only a handful of fault detection algorithms have been developed to increase the KECCAK implementation's resilience [10][11][12][13][14][15][16][17][18][19]. Mestiri et al proposed in [10] an effective error detection technique based on modifying the KECCAK architecture.…”
Section: Introductionmentioning
confidence: 99%
“…More importantly, the introduced errors result in an incorrect KECCAK state, rendering the integrity message output untrustworthy. So far, only a handful of fault detection algorithms have been developed to increase the KECCAK implementation’s resilience [ 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 ].…”
Section: Introductionmentioning
confidence: 99%