[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

Protecting Dilithium against leakage: revisited sensitivity analysis and improved implementations

M Azouaoui, O Bronchain, G Cassiers… - Cryptology ePrint …, 2022 - eprint.iacr.org
CRYSTALS-Dilithium has been selected by the NIST as the new stan-dard for post-quantum
digital signatures. In this work, we revisit the side-channel countermeasures of Dilithium in …

Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates

K Xagawa, A Ito, R Ueno, J Takahashi… - Advances in Cryptology …, 2021 - Springer
We investigate all NIST PQC Round 3 KEM candidates from the viewpoint of fault-injection
attacks: Classic McEliece, Kyber, NTRU, Saber, BIKE, FrodoKEM, HQC, NTRU Prime, and …

Multiple-valued plaintext-checking side-channel attacks on post-quantum kems

Y Tanaka, R Ueno, K Xagawa, A Ito… - IACR Transactions on …, 2023 - tches.iacr.org
In this paper, we present a side-channel analysis (SCA) on key encapsulation mechanisms
(KEMs) based on the Fujisaki–Okamoto (FO) transformation and its variants. Many post …

Sca-ldpc: A code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes

Q Guo, D Nabokov, A Nilsson, T Johansson - International Conference on …, 2023 - Springer
Whereas theoretical attacks on standardized cryptographic primitives rarely lead to actual
practical attacks, the situation is different for side-channel attacks. Improvements in the …

Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles–A case study of Kyber

M Shen, C Cheng, X Zhang, Q Guo… - IACR Transactions on …, 2023 - tches.iacr.org
Side-channel resilience is a crucial feature when assessing whether a postquantum
cryptographic proposal is sufficiently mature to be deployed. In this paper, we propose a …

A key-recovery side-channel attack on Classic McEliece implementations

Q Guo, A Johansson, T Johansson - IACR Transactions on …, 2022 - tches.iacr.org
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a
KEM finalist in the NIST Post-quantum Cryptography Standardization Project. Our novel idea …

Correlation electromagnetic analysis on an FPGA implementation of CRYSTALS-Kyber

RC Rodriguez, F Bruguier, E Valea… - 2023 18th Conference …, 2023 - ieeexplore.ieee.org
Post-quantum cryptography represents a category of cryptosystems resistant to quantum
algorithms. Such schemes are under the scrutiny of their mathematical security in the context …

High-order masking of NTRU

JS Coron, F Gérard, M Trannoy… - IACR Transactions on …, 2023 - tches.iacr.org
The main protection against side-channel attacks consists in computing every function with
multiple shares via the masking countermeasure. While the masking countermeasure was …

Compact and efficient KEMs over NTRU lattices

Z Liang, B Fang, J Zheng, Y Zhao - Computer Standards & Interfaces, 2024 - Elsevier
The NTRU lattice is a promising candidate to construct practical cryptosystems, in particular
key encapsulation mechanism (KEM), resistant to quantum computing attacks. Nevertheless …