Transitioning organizations to post-quantum cryptography

D Joseph, R Misoczki, M Manzano, J Tricot… - Nature, 2022 - nature.com
Quantum computers are expected to break modern public key cryptography owing to Shor's
algorithm. As a result, these cryptosystems need to be replaced by quantum-resistant …

Generic side-channel attacks on CCA-secure lattice-based PKE and KEMs

P Ravi, SS Roy, A Chattopadhyay… - IACR transactions on …, 2020 - tches.iacr.org
In this work, we demonstrate generic and practical EM side-channel assisted chosen
ciphertext attacks over multiple LWE/LWR-based Public Key Encryption (PKE) and Key …

Magnifying side-channel leakage of lattice-based cryptosystems with chosen ciphertexts: The case study of kyber

Z Xu, O Pemberton, SS Roy, D Oswald… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Lattice-based cryptography, as an active branch of post-quantum cryptography (PQC), has
drawn great attention from side-channel analysis researchers in recent years. Despite the …

Shorter hash-and-sign lattice-based signatures

T Espitau, M Tibouchi, A Wallet, Y Yu - Annual International Cryptology …, 2022 - Springer
Lattice-based digital signature schemes following the hash-and-sign design paradigm of
Gentry, Peikert and Vaikuntanathan (GPV) tend to offer an attractive level of efficiency …

[PDF][PDF] A comprehensive survey of threshold digital signatures: Nist standards, post-quantum cryptography, exotic techniques, and real-world applications

K Sedghighadikolaei, AA Yavuz - arXiv preprint arXiv:2311.05514, 2023 - researchgate.net
Threshold digital signatures enable a distributed execution of signature functionalities and
will play a crucial role in the security of emerging decentralized next-generation networked …

Side-channel and fault-injection attacks over lattice-based post-quantum schemes (Kyber, Dilithium): Survey and new results

P Ravi, A Chattopadhyay, JP D'Anvers… - ACM Transactions on …, 2024 - dl.acm.org
In this work, we present a systematic study of Side-Channel Attacks (SCA) and Fault
Injection Attacks (FIA) on structured lattice-based schemes, with main focus on Kyber Key …

Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software/hardware co …

VB Dang, F Farahmand, M Andrzejczak… - … ePrint Archive: Report …, 2020 - par.nsf.gov
Performance in hardware has typically played a major role in differentiating among leading
candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic …

TensorCrypto: High throughput acceleration of lattice-based cryptography using tensor core on GPU

WK Lee, H Seo, Z Zhang, SO Hwang - IEEE Access, 2022 - ieeexplore.ieee.org
Tensor core is a newly introduced hardware unit in NVIDIA GPU chips that allows matrix
multiplication to be computed much faster than in the integer and floating-point units. In this …

A unified cryptoprocessor for lattice-based signature and key-exchange

A Aikata, AC Mert, D Jacquemin, A Das… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
We propose design methodologies for building a compact, unified and programmable
cryptoprocessor architecture that computes post-quantum key agreement and digital …

High-speed masking for polynomial comparison in lattice-based KEMs

F Bache, C Paglialonga, T Oder, T Schneider… - IACR Transactions on …, 2020 - tches.iacr.org
With the NIST post-quantum standardization competition entering the second round, the
interest in practical implementation results of the remaining NIST candidates is steadily …