A Cache Timing Analysis of HC-256

Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

View graph of relations

In this paper, we describe a cache-timing attack against the stream cipher HC-256, which is the strong version of eStream winner HC-128. The attack is based on an abstract model of cache timing attacks that can also be used for designing stream ciphers. From the observations made in our analysis, we derive a number of design principles for hardening ciphers against cache timing attacks.
Original languageEnglish
Title of host publicationSelected Areas in Cryptography : Workshop Proceedings
EditorsR. Avanzi, L. Keliher, F. Sica
PublisherSpringer
Publication date2009
Pages199-213
StatePublished

Conference

ConferenceSelected Areas in Cryptography
CitySackville, Canada
Period01/01/08 → …
NameSpringer Lecture Notes in Computer Science (LNCS)
Number5381
Download as:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word

ID: 5158518