Hertzbleed: Turning power {Side-Channel} attacks into remote timing attacks on x86

Y Wang, R Paccagnella, ET He, H Shacham… - 31st USENIX Security …, 2022 - usenix.org
Power side-channel attacks exploit data-dependent variations in a CPU's power
consumption to leak secrets. In this paper, we show that on modern Intel (and AMD) x86 …

M-SIDH and MD-SIDH: countering SIDH attacks by masking information

TB Fouotsa, T Moriya, C Petit - … on the Theory and Applications of …, 2023 - Springer
The SIDH protocol is an isogeny-based key exchange protocol using supersingular
isogenies, designed by Jao and De Feo in 2011. The protocol underlies the SIKE algorithm …

Supersingular curves you can trust

A Basso, G Codogni, D Connolly, L De Feo… - … Conference on the …, 2023 - Springer
Generating a supersingular elliptic curve such that nobody knows its endomorphism ring is a
notoriously hard task, despite several isogeny-based protocols relying on such an object. A …

Post-quantum TLS without handshake signatures

P Schwabe, D Stebila, T Wiggers - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
We present KEMTLS, an alternative to the TLS 1.3 handshake that uses key-encapsulation
mechanisms (KEMs) instead of signatures for server authentication. Among existing post …

Benchmarking post-quantum cryptography in TLS

C Paquin, D Stebila, G Tamvada - … , PQCrypto 2020, Paris, France, April 15 …, 2020 - Springer
Post-quantum cryptographic primitives have a range of trade-offs compared to traditional
public key algorithms, either having slower computation or larger public keys and …

The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents

J Chávez-Saab, JJ Chi-Domínguez, S Jaques… - Journal of Cryptographic …, 2022 - Springer
Recent independent analyses by Bonnetain–Schrottenloher and Peikert in Eurocrypt 2020
significantly reduced the estimated quantum security of the isogeny-based commutative …

Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates

K Xagawa, A Ito, R Ueno, J Takahashi… - Advances in Cryptology …, 2021 - Springer
We investigate all NIST PQC Round 3 KEM candidates from the viewpoint of fault-injection
attacks: Classic McEliece, Kyber, NTRU, Saber, BIKE, FrodoKEM, HQC, NTRU Prime, and …

New SIDH countermeasures for a more efficient key exchange

A Basso, TB Fouotsa - International Conference on the Theory and …, 2023 - Springer
Abstract The Supersingular Isogeny Diffie-Hellman (SIDH) protocol has been the main and
most efficient isogeny-based encryption protocol, until a series of breakthroughs led to a …

Shorter signatures based on tailor-made minimalist symmetric-key crypto

C Dobraunig, D Kales, C Rechberger… - Proceedings of the …, 2022 - dl.acm.org
Signature schemes based on the MPC-in-the-head approach (MPCitH) have either been
designed by taking a proof system and selecting a suitable symmetric-key primitive (Picnic …

An overview of quantum security for distributed energy resources

J Ahn, J Chung, T Kim, B Ahn… - 2021 IEEE 12th …, 2021 - ieeexplore.ieee.org
Quantum computing is a game-changing technology that will push the boundaries of
cybersecurity and cryptography of power infrastructures including distributed energy …