Hertzbleed: Turning power {Side-Channel} attacks into remote timing attacks on x86

Y Wang, R Paccagnella, ET He, H Shacham… - 31st USENIX Security …, 2022 - usenix.org
Power side-channel attacks exploit data-dependent variations in a CPU's power
consumption to leak secrets. In this paper, we show that on modern Intel (and AMD) x86 …

A faster software implementation of SQISign

K Lin, W Wang, Z Xu, CA Zhao - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Isogeny-based cryptography is famous for its short key size. As one of the most compact
digital signatures, SQIsign (Short Quaternion and Isogeny Signature) is attractive among …

Mathematics of isogeny based cryptography

L De Feo - arXiv preprint arXiv:1711.04062, 2017 - arxiv.org
These lectures notes were written for a summer school on Mathematics for post-quantum
cryptography in Thi\es, Senegal. They try to provide a guide for Masters' students to get …

On the cost of computing isogenies between supersingular elliptic curves

G Adj, D Cervantes-Vázquez… - … Conference on Selected …, 2018 - Springer
The security of the Jao-De Feo Supersingular Isogeny Diffie-Hellman (SIDH) key agreement
scheme is based on the intractability of the Computational Supersingular Isogeny (CSSI) …

A lightweight blockchain based framework for underwater iot

MA Uddin, A Stranieri, I Gondal, V Balasurbramanian - Electronics, 2019 - mdpi.com
The Internet of Things (IoT) has facilitated services without human intervention for a wide
range of applications, including underwater monitoring, where sensors are located at …

SIKE'd up: Fast hardware architectures for supersingular isogeny key encapsulation

B Koziel, AB Ackie, R El Khatib… - … on Circuits and …, 2020 - ieeexplore.ieee.org
In this work, we present a fast parallel architecture to perform supersingular isogeny key
encapsulation (SIKE). We propose and implement a fast isogeny accelerator architecture …

Supersingular isogeny key encapsulation (SIKE) round 2 on ARM Cortex-M4

H Seo, M Anastasova, A Jalali… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We present the first practical software implementation of Supersingular Isogeny Key
Encapsulation (SIKE) round 2, targeting NIST's 1, 2, 3, and 5 security levels on 32-bit ARM …

SIDH on ARM: faster modular multiplications for faster post-quantum supersingular isogeny key exchange

H Seo, Z Liu, P Longa, Z Hu - IACR Transactions on Cryptographic …, 2018 - tches.iacr.org
We present high-speed implementations of the post-quantum supersingular isogeny Diffie-
Hellman key exchange (SIDH) and the supersingular isogeny key encapsulation (SIKE) …

High-speed FPGA implementation of SIKE based on an ultra-low-latency modular multiplier

J Tian, B Wu, Z Wang - … Transactions on Circuits and Systems I …, 2021 - ieeexplore.ieee.org
The supersingular isogeny key encapsulation (SIKE) protocol, as one of the post-quantum
protocol candidates, is widely regarded as the best alternative for curve-based cryptography …

An efficient and high-speed overlap-free karatsuba-based finite-field multiplier for fgpa implementation

M Heidarpur, M Mirhassani - IEEE Transactions on Very Large …, 2021 - ieeexplore.ieee.org
Cryptography systems have become inseparable parts of almost every communication
device. Among cryptography algorithms, public-key cryptography, and in particular elliptic …