针对一种基于SM3 算法的消息验证码的相关能量攻击

袁野, 曲凯歌, 乌力吉, 马佳伟… - 信息与电子工程前沿 …, 2022 - fitee.zjujournals.com
基于哈希函数的消息验证码(HMAC) 被广泛应用于身份认证和消息完整性领域. SM3
函数作为中国的哈希函数在国内具有很高市场价值. 基于SM3 的HMAC (HMAC-SM3) …

Correlation power attack on a message authentication code based on SM3

Y Yuan, K Qu, L Wu, J Ma, X Zhang - Frontiers of Information Technology & …, 2019 - Springer
Hash-based message authentication code (HMAC) is widely used in authentication and
message integrity. As a Chinese hash algorithm, the SM3 algorithm is gradually winning …

Research on differential power analysis of HMAC-SM3

J Xie, W Sun, D Gu, Z Guo, J Liu… - … on Computer Science …, 2015 - atlantis-press.com
The HMAC algorithm is widely used to provide authentication and message integrity in
digital communications. However, if the HMAC cryptographic algorithm is implemented in …

[PDF][PDF] 针对基于SM3 的HMAC 的能量分析攻击方法

杜之波, 吴震, 王敏, 饶金涛 - 通信学报, 2016 - infocomm-journal.com
能量分析攻击, 等提出了模板攻击. 由于能量分析攻击成功率高, 代价相对较低,
成为侧信道攻击研究热点方向之一. 散列消息鉴别码作为一种基于散列函数和密钥进行消息认证 …

A chosen-plaintext differential power analysis attack on HMAC-SM3

L Guo, L Wang, D Liu, W Shan… - … and Security (CIS), 2015 - ieeexplore.ieee.org
The HMAC algorithm involves a hash function with a secret key. And SM3 is the only
standard hash algorithm of China. HMAC-SM3 algorithm is based on the mixing of different …

A new countermeasure against side channel attack for HMAC-SM3 hardware

JW Ma, XG Guan, T Zhou, T Sun - 2017 IEEE 12th International …, 2017 - ieeexplore.ieee.org
With the application of Hash-based Message Authentication Code (HMAC) in the field of
security, the research on its Side Channel Attack (SCA) has been paid more and more …

A first-order differential power analysis attack on HMAC-SM3

L Guo, L Wang, Q Li, Z Zhang, D Liu… - … on Information Science …, 2015 - atlantis-press.com
HMAC algorithm is one of the most famous keyed hash functions, and widely utilized. And
SM3 is the only standard hash algorithm of China. However, most cryptographic algorithms …

A novel masking scheme for SM3 based MAC

K Qu, W An, L Wu, Y Ren, X Zhang - China Communications, 2015 - ieeexplore.ieee.org
The Chinese hash algorithm SM3 is verified to be secure enough, but improper hardware
implementation may lead to leakage. A masking scheme for SM3 algorithm is proposed to …

Differential power analysis of HMAC based on SHA-2, and countermeasures

R McEvoy, M Tunstall, CC Murphy… - … Security Applications: 8th …, 2007 - Springer
The HMAC algorithm is widely used to provide authentication and message integrity to
digital communications. However, if the HMAC algorithm is implemented in embedded …

Differential and correlation power analysis attacks on hmac-whirlpool

F Zhang, ZJ Shi - 2011 Eighth International Conference on …, 2011 - ieeexplore.ieee.org
In cryptography, a keyed-Hash Message Authentication Code (HMAC) is a type of message
authentication code (MAC) calculated with a cryptographic hash function and a secret key …