Single-Trace Attacks on Keccak

Since its selection as the winner of the SHA-3 competition, Keccak, with all its variants, has found a large number of applications. It is, for instance, a common building block in schemes submitted to NIST’s post-quantum cryptography project. In many of these applications, Keccak processes ephemer...

Full description

Bibliographic Details
Main Authors: Matthias J. Kannwischer, Peter Pessl, Robert Primas
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2020-06-01
Series:Transactions on Cryptographic Hardware and Embedded Systems
Subjects:
Online Access:https://tches.iacr.org/index.php/TCHES/article/view/8590