Side-channel and fault-injection attacks over lattice-based post-quantum schemes (Kyber, Dilithium): Survey and new results

P Ravi, A Chattopadhyay, JP D'Anvers… - ACM Transactions on …, 2024 - dl.acm.org
In this work, we present a systematic study of Side-Channel Attacks (SCA) and Fault
Injection Attacks (FIA) on structured lattice-based schemes, with main focus on Kyber Key …

[HTML][HTML] Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey

J Chen, H Deng, H Su, M Yuan, Y Ren - Electronics, 2024 - mdpi.com
As the most popular cryptographic scheme in the post-quantum field, lattices have received
extensive attention and research. Not only do they provide quantum-resistant security, they …

Anonymous Lattice-Based Authentication Protocol for Vehicular Communications

A Shahidinejad, J Abawajy, S Huda - Vehicular Communications, 2024 - Elsevier
Quantum-proof authentication is essential for vehicular communications as the threat of
quantum computing attacks on traditional encryption methods grows. Several lattice-based …

Designing quantum-secure attribute-based encryption

YS Rao, V Srivastava, T Mohanty, SK Debnath - Cluster Computing, 2024 - Springer
In the last couple of decades, Attribute-Based Encryption (ABE) has been a promising
encryption technique to realize fine-grained access control over encrypted data. ABE has …

[HTML][HTML] C-privacy: a social relationship-driven image customization sharing method in cyber-physical networks

D Wu, J Liu, Y Wan, Z Yang, R Wang, X Lin - Digital Communications and …, 2024 - Elsevier
Abstract Cyber-Physical Networks (CPN) are comprehensive systems that integrate
information and physical domains, and are widely used in various fields such as online …

A new approach to delegate signing rights to proxy signers using isogeny-based cryptography

K Dey, S Kumar, V Srivastava, SK Debnath - arXiv preprint arXiv …, 2024 - arxiv.org
E-governance is a two-way protocol through which one can use government services, share
data and request information. It refers to the use of communication and information …

[PDF][PDF] Post Quantum Cryptography: A survey of Past and Future

PN Kokare, D Vora, S Patil, K Kotecha, V Khairnar… - researchgate.net
As an evolving growth of digitalization in the global World, there is an urgent need to keep
an eye on the protection of our secret data. These secret data can be protected using …