%0 Conference Proceedings %T An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture %+ University of Bristol [Bristol] %A Hoerder, Simon %A Wójcik, Marcin %A Tillich, Stefan %A Page, Daniel %Z Part 5: Hardware Implementation %< avec comité de lecture %( Lecture Notes in Computer Science %B 5th Workshop on Information Security Theory and Practices (WISTP) %C Heraklion, Crete, Greece %Y Claudio A. Ardagna %Y Jianying Zhou %I Springer %3 Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication %V LNCS-6633 %P 160-174 %8 2011-06-01 %D 2011 %R 10.1007/978-3-642-21040-2_11 %Z Computer Science [cs]Conference papers %X Cryptographic hash functions are an omnipresent component in security-critical software and devices; they support digital signature and data authenticity schemes, mechanisms for key derivation, pseudo-random number generation and so on. A criterion for candidate hash functions in the SHA-3 contest is resistance against side-channel analysis which is a major concern especially for mobile devices. This paper explores the implementation of said candidates on a variant of the Power-Trust platform; our results highlight a flexible solution to power analysis attacks, implying only a modest performance overhead. %G English %Z TC 11 %Z WG 11.2 %2 https://inria.hal.science/hal-01573303/document %2 https://inria.hal.science/hal-01573303/file/978-3-642-21040-2_11_Chapter.pdf %L hal-01573303 %U https://inria.hal.science/hal-01573303 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-WISTP %~ IFIP-WG11-2 %~ IFIP-LNCS-6633