Publication: Research - peer-review › Article in proceedings – Annual report year: 2009
In this paper, we describe a cache-timing attack against the stream cipher HC-256, which is the strong version of eStream winner HC-128. The attack is based on an abstract model of cache timing attacks that can also be used for designing stream ciphers. From the observations made in our analysis, we derive a number of design principles for hardening ciphers against cache timing attacks.
|Title||Selected Areas in Cryptography : Workshop Proceedings|
|Editors||R. Avanzi, L. Keliher, F. Sica|
|Conference||Selected Areas in Cryptography|
|Period||01/01/08 → …|
|Name||Springer Lecture Notes in Computer Science (LNCS)|
Loading map data...