Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM JP D’Anvers, A Karmakar, S Sinha Roy, F Vercauteren Progress in Cryptology–AFRICACRYPT 2018: 10th International Conference on …, 2018 | 343 | 2018 |
Saber (round 2 submission) JP D’Anvers, A Karmakar, SS Roy, F Vercauteren URL: https://csrc. nist. gov/projects/post-quantum-cryptography/round-2 …, 2019 | 145* | 2019 |
A Side-Channel Resistant Implementation of SABER M Van Beirendonck, JP D’Anvers, A Karmakar, J Balasch, I Verbauwhede | 102* | 2020 |
SABER: Mod-LWR based KEM (Round 3 Submission) A Basso, JMB Mera, JP D’Anvers, A Karmakar, SS Roy, ... | 85* | 2020 |
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography S Bhasin, JP D’Anvers, D Heinz, T Pöppelmann, M Van Beirendonck | 70 | 2021 |
Timing attacks on error correcting codes in post-quantum schemes JP D'Anvers, M Tiepelt, F Vercauteren, I Verbauwhede Proceedings of ACM Workshop on Theory of Implementation Security Workshop, 2-9, 2019 | 69 | 2019 |
Decryption failure attacks on IND-CCA secure lattice-based schemes JP D’Anvers, Q Guo, T Johansson, A Nilsson, F Vercauteren, ... Public-Key Cryptography–PKC 2019: 22nd IACR International Conference on …, 2019 | 65 | 2019 |
On the impact of decryption failures on the security of LWE/LWR based schemes JP D’Anvers, F Vercauteren, I Verbauwhede | 46 | 2018 |
The impact of error dependencies on Ring/Mod-LWE/LWR based schemes JP D’Anvers, F Vercauteren, I Verbauwhede Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019 …, 2019 | 43 | 2019 |
Saber (round 1 Submission) JP D’Anvers, A Karmakar, SS Roy, F Vercauteren Technical report, National Institute of Standards and Technology, 2017 …, 2017 | 39* | 2017 |
(One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes JP D’Anvers, M Rossi, F Virdia Annual International Conference on theTheory and Applications of …, 2020 | 38 | 2020 |
Higher-order masked saber S Kundu, JP D’Anvers, M Van Beirendonck, A Karmakar, I Verbauwhede International Conference on Security and Cryptography for Networks, 93-116, 2022 | 27 | 2022 |
Higher-order masked ciphertext comparison for lattice-based cryptography JP D'Anvers, D Heinz, P Pessl, M Van Beirendonck, I Verbauwhede Cryptology ePrint Archive, 2021 | 27 | 2021 |
Side-channel and fault-injection attacks over lattice-based post-quantum schemes (Kyber, Dilithium): Survey and new results P Ravi, A Chattopadhyay, JP D’Anvers, A Baksi ACM Transactions on Embedded Computing Systems 23 (2), 1-54, 2024 | 26 | 2024 |
Revisiting higher-order masked comparison for lattice-based cryptography: Algorithms and bit-sliced implementations JP D’Anvers, M Van Beirendonck, I Verbauwhede IEEE Transactions on Computers 72 (2), 321-332, 2022 | 25 | 2022 |
FPT: A fixed-point accelerator for torus fully homomorphic encryption M Van Beirendonck, JP D'Anvers, F Turan, I Verbauwhede Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 24 | 2023 |
Pushing the limits of generic side-channel attacks on LWE-based KEMs-parallel PC oracle attacks on Kyber KEM and beyond G Rajendran, P Ravi, JP D’anvers, S Bhasin, A Chattopadhyay IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023 | 23 | 2023 |
Post-Quantum Cryptography: Current state and quantum mitigation W Beullens, JP D'Anvers, AT Hülsing, T Lange, L Panny, ... ENISA, 2021 | 21* | 2021 |
Analysis and Comparison of Table-based Arithmetic to Boolean Masking M Van Beirendonck, JP D’Anvers, I Verbauwhede | 18 | 2021 |
Multitarget decryption failure attacks and their application to Saber and Kyber JP D’Anvers, S Batsleer | 9 | 2021 |