Whereas theoretical attacks on standardized cryptographic primitives rarely lead to actual practical attacks, the situation is different for side-channel attacks. Improvements in the …
Q Guo, E Mårtensson - International Conference on Post-Quantum …, 2023 - Springer
The ephemeral-key setting of a lattice-based Key Encapsulation Mechanism (KEM) scheme assumes critical importance when considering certain advanced functionalities, such as …
Cryptosystems based on supersingular isogeny are a novel tool in post-quantum cryptography. One compelling characteristic is their concise keys and ciphertexts. However …
In an effort to circumvent the high cost of standard countermeasures against side-channel attacks in post-quantum cryptography, some works have de-veloped low-cost detection …
A Ito, R Ueno, R Tanaka, N Homma - Cryptology ePrint Archive, 2023 - eprint.iacr.org
This paper formally analyzes two major non-profiled deep-learning-based side-channel attacks (DL-SCAs): differential deep-learning analysis (DDLA) by Timon and collision DL …
T Yu, C Cheng, Z Yang, Y Wang, Y Pan… - Cryptology ePrint …, 2024 - eprint.iacr.org
Abstract Number Theoretic Transform (NTT) has been widely used in accelerating computations in lattice-based cryptography. However, attackers can potentially launch …
Q Guo, E Mårtensson, A Åström - Cryptology ePrint Archive, 2024 - eprint.iacr.org
In this paper, we study the robustness of Kyber, the Learning With Errors (LWE)-based Key Encapsulation Mechanism (KEM) chosen for standardization by NIST, against key mismatch …
A Liu, A Wang, S Sun, C Wei, Y Ding… - Cryptology ePrint …, 2024 - eprint.iacr.org
Side-channel analysis based on machine learning, especially neural networks, has gained significant attention in recent years. However, many existing methods still suffer from certain …