scispace - formally typeset
H

Helena Handschuh

Researcher at Spansion

Publications -  73
Citations -  2235

Helena Handschuh is an academic researcher from Spansion. The author has contributed to research in topics: Cryptography & Encryption. The author has an hindex of 26, co-authored 73 publications receiving 2111 citations. Previous affiliations of Helena Handschuh include École Normale Supérieure & Katholieke Universiteit Leuven.

Papers
More filters
Journal Article

Security analysis of SHA-256 and sisters

TL;DR: In this article, the security of SHA-256, SHA-384 and SHA-512 against collision attacks was studied. But the authors concluded that neither Chabaud and Joux's attack, nor Dobbertin-style attacks also don't apply on the underlying structure.
Book ChapterDOI

Security Analysis of SHA-256 and Sisters

TL;DR: It is shown that slightly simplified versions of the hash functions are surprisingly weak : whenever symmetric constants and initialization values are used throughout the computations, and modular additions are replaced by exclusive or operations, symmetric messages hash to symmetric digests.
Patent

Randomized rsa-based cryptographic exponentiation resistant to side channel and fault attacks

TL;DR: In this article, the authors present a cryptographic component that facilitates data encryption, data decryption, and/or generation of digital signatures associated with messages, including a randomized exponentiation component.
Book ChapterDOI

Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms

TL;DR: In this paper, the authors discuss key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions, and show that while universal hash function offers provable security, their simple combinatorial properties make them less robust than conventional message authentication primitives.
Proceedings ArticleDOI

Hardware intrinsic security from D flip-flops

TL;DR: It is shown that against all odds, enough randomness exists in such elements when implemented on an Application-Specific Integrated Circuit (ASIC) to turn the responses of a number of D flip-flops into a secret random sequence allowing to derive keys for use in conjunction with cryptographic algorithms.