[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

A key-recovery side-channel attack on Classic McEliece implementations

Q Guo, A Johansson, T Johansson - IACR Transactions on …, 2022 - tches.iacr.org
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a
KEM finalist in the NIST Post-quantum Cryptography Standardization Project. Our novel idea …

Hardware Moving Target Defenses against Physical Attacks: Design Challenges and Opportunities

DS Koblah, F Ganji, D Forte, S Tajik - … of the 9th ACM Workshop on …, 2022 - dl.acm.org
The concept of moving target defense (MTD) has entrenched itself as a viable strategy to
reverse the typical asymmetries in cyber warfare. MTDs are technologies that seek to make …

Information theory-based evolution of neural networks for side-channel analysis

RY Acharya, F Ganji, D Forte - IACR Transactions on Cryptographic …, 2022 - par.nsf.gov
Profiled side-channel analysis (SCA) leverages leakage from cryptographic
implementations to extract the secret key. When combined with advanced methods in neural …

[HTML][HTML] A two-stage feature aggregation network for multi-category soybean leaf disease identification

R Pan, J Lin, J Cai, L Zhang, J Liu, X Wen… - Journal of King Saud …, 2023 - Elsevier
Accurate identification of soybean leaf disease is of utmost importance for its cultivation and
fine management, as it is a critical factor contributing to the decreased quality and yield of …

Adapting belief propagation to counter shuffling of NTTs

J Hermelink, S Streit, E Strieder… - IACR Transactions on …, 2023 - tches.iacr.org
Abstract The Number Theoretic Transform (NTT) is a major building block in recently
introduced lattice based post-quantum (PQ) cryptography. The NTT was target of a number …

Tripletpower: Deep-learning side-channel attacks over few traces

C Wang, J Dani, S Reilly, A Brownfield… - … Security and Trust …, 2023 - ieeexplore.ieee.org
Deep learning has been utilized as a promising technique in side-channel attacks. However,
to recover keys successfully, deep-learning side-channel attacks often require thousands of …

A survey and perspective on artificial intelligence for security-aware electronic design automation

D Koblah, R Acharya, D Capecci… - ACM Transactions on …, 2023 - dl.acm.org
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly
used in several fields to improve performance and the level of automation. In recent years …

Lightweight but not easy: side-channel analysis of the ascon authenticated cipher on a 32-bit microcontroller

L Weissbart, S Picek - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Ascon is a recently standardized suite of symmetric cryptography for authenticated
encryption and hashing algorithms designed to be lightweight. The Ascon scheme has been …

PowerGAN: A Machine Learning Approach for Power Side‐Channel Attack on Compute‐in‐Memory Accelerators

Z Wang, Y Wu, Y Park, S Yoo, X Wang… - Advanced Intelligent …, 2023 - Wiley Online Library
Analog compute‐in‐memory (CIM) systems are promising candidates for deep neural
network (DNN) inference acceleration. However, as the use of DNNs expands, protecting …