Correlation electromagnetic analysis on an FPGA implementation of CRYSTALS-Kyber

RC Rodriguez, F Bruguier, E Valea… - 2023 18th Conference …, 2023 - ieeexplore.ieee.org
Post-quantum cryptography represents a category of cryptosystems resistant to quantum
algorithms. Such schemes are under the scrutiny of their mathematical security in the context …

Side channel security oriented evaluation and protection on hardware implementations of kyber

Y Zhao, S Pan, H Ma, Y Gao, X Song… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The emergence of quantum computing and its impact on current cryptographic algorithms
has triggered the migration to post-quantum cryptography (PQC). Among the PQC …

Vulnerable pqc against side channel analysis-a case study on kyber

H Ma, S Pan, Y Gao, J He, Y Zhao… - 2022 Asian Hardware …, 2022 - ieeexplore.ieee.org
The emergence of quantum computing and its impact on current cryptographic algorithms
has triggered the migration to post-quantum cryptography (PQC). Among the PQC …

Sca-ldpc: A code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes

Q Guo, D Nabokov, A Nilsson, T Johansson - International Conference on …, 2023 - Springer
Whereas theoretical attacks on standardized cryptographic primitives rarely lead to actual
practical attacks, the situation is different for side-channel attacks. Improvements in the …

A single-trace message recovery attack on a masked and shuffled implementation of CRYSTALS-Kyber

S Jendral, K Ngo, R Wang, E Dubrova - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Last year CRYSTALS-Kyber was chosen by NIST as a new, post-quantum secure key
encapsulation mechanism to be standardized. This makes it important to assess the …

Implementation attacks on post-quantum cryptographic schemes

M Taha, T Eisenbarth - Cryptology ePrint Archive, 2015 - eprint.iacr.org
Post-quantum cryptographic schemes have been developed in the last decade in response
to the rise of quantum computers. Fortunately, several schemes have been developed with …

A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-Kyber

Y Ji, E Dubrova - Proceedings of the 2023 Workshop on Attacks and …, 2023 - dl.acm.org
NIST has recently selected CRYSTALS-Kyber as a new public key encryption and key
establishment algorithm to be standardized. This makes it important to evaluate the …

Don't reject this: Key-recovery timing attacks due to rejection-sampling in HQC and BIKE

Q Guo, C Hlauschek, T Johansson, N Lahr… - IACR Transactions on …, 2022 - tches.iacr.org
Well before large-scale quantum computers will be available, traditional cryptosystems must
be transitioned to post-quantum (PQ) secure schemes. The NIST PQC competition aims to …

Side-Channel Analysis of Post-Quantum Cryptographic Algorithms

K Ngo - 2023 - diva-portal.org
Public key cryptographic schemes used today rely on the intractability of certain
mathematical problems that are known to be efficiently solvable with a large-scale quantum …

Chosen ciphertext correlation power analysis on Kyber

Y Yang, Z Wang, J Ye, J Fan, S Chen, H Li, X Li, Y Cao - Integration, 2023 - Elsevier
The post-quantum cryptography (PQC) standardization process of the National Institute of
Standards and Technology (NIST) has entered the final round. Kyber is one of the four key …