Section: New Results
Cryptanalysis (Symmetric)
Participants : Charles Bouillaguet, Pierre-Alain Fouque, Gaëtan Leurent.
-
Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damgaard (SAC '09)
-
Practical Electromagnetic Template Attack on HMAC (CHES '09)
Besides the design of a hash function, have also attacked some schemes: such as Edon-R (recovering an equivalent key when the MAC function is H(k||m) ) and we have the best attacks on the Lesamnta hash function.
Following the work of Eurocrypt last year [60] on cryptanalysis of mode of operation for hash functions, some new attacks have been proposed at SAC [25] . Finally, in order to attack some standards such as HMAC-SHA1, we have used side channel attacks [39] .