Algorithmic security is insufficient: A comprehensive survey on implementation attacks haunting post-quantum security

AC Canto, J Kaur, MM Kermani… - arXiv preprint arXiv …, 2023 - arxiv.org
This survey is on forward-looking, emerging security concerns in post-quantum era, ie, the
implementation attacks for 2022 winners of NIST post-quantum cryptography (PQC) …

A survey on post-quantum public-key signature schemes for secure vehicular communications

KA Shim - IEEE Transactions on Intelligent Transportation …, 2021 - ieeexplore.ieee.org
Basic security requirements such as confidentiality, user authentication and data integrity,
are assured by using public-key cryptography (PKC). In particular, public-key signature …

Roadmap of post-quantum cryptography standardization: Side-channel attacks and countermeasures

A Shaller, L Zamir, M Nojoumian - Information and Computation, 2023 - Elsevier
Quantum computing utilizes properties of quantum physics to build a fast-computing
machine that can perform quantum computations. This will eventually lead to faster and …

Information-set decoding with hints

AL Horlemann, S Puchinger, J Renner… - Code-Based …, 2021 - Springer
This paper studies how to incorporate small information leakages (called “hints”) into
information-set decoding (ISD) algorithms. In particular, the influence of these hints on …

Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions

S Chowdhury, A Covic, RY Acharya, S Dupee… - Journal of Cryptographic …, 2021 - Springer
Over the past decades, quantum technology has seen consistent progress, with notable
recent developments in the field of quantum computers. Traditionally, this trend has been …

Survey on cryptanalysis of code-based cryptography: From theoretical to physical attacks

V Drăgoi, T Richmond, D Bucerzan… - 2018 7th international …, 2018 - ieeexplore.ieee.org
Nowadays public-key cryptography is based on number theory problems, such as
computing the discrete logarithm on an elliptic curve or factoring big integers. Even though …

Protecting PUF error correction by codeword masking

D Merli, F Stumpf, G Sigl - Cryptology ePrint Archive, 2013 - eprint.iacr.org
One of the main applications of Physical Unclonable Functions~(PUFs) is unique key
generation. While the advantages of PUF-based key extraction and embedding have been …

Differential power analysis attack on the secure bit permutation in the McEliece cryptosystem

M Petrvalsky, T Richmond… - 2016 26th …, 2016 - ieeexplore.ieee.org
The segment of post-quantum cryptography rises its importance with increasing
improvements in the quantum computing. Cryptographic post-quantum algorithms have …

Towards one cycle per bit asymmetric encryption: Code-based cryptography on reconfigurable hardware

S Heyse, T Güneysu - International Workshop on Cryptographic Hardware …, 2012 - Springer
Most advanced security systems rely on public-key schemes based either on the
factorization or the discrete logarithm problem. Since both problems are known to be closely …

Timing attacks against the syndrome inversion in code-based cryptosystems

F Strenzke - … : 5th International Workshop, PQCrypto 2013, Limoges …, 2013 - Springer
In this work we present the first practical key-aimed timing attack against code-based
cryptosystems. It arises from vulnerabilities that are present in the inversion of the error …