Event Details

Secure and Parallel Dataflow Design of the SHA-3 Algorithm.

Presenter: Ali Alzahrani
Supervisor:

Date: Fri, August 17, 2018
Time: 09:30:00 - 00:00:00
Place: EOW 430

ABSTRACT

Abstract:
The immunity of dataflow computing to side channel
attacks will be investigated in this work. In this work we propose
 several countermeasures approaches for side channel attacks.
All these approaches are based on adopting different input data
scheduling strategies. Extensive simulations of the SHA-3 algorithm
using these scheduling strategies where performed. The results
indicate that immunity to side channel attacks can be achieved without incurring
extra delay, power, or area. The SHA-3 algorithm and
the proposed countermeasures approaches were simulated by
developing an object-oriented MATLAB models to verify and
validate the correctness of this computing model.