[PDF][PDF] Towards security recommendations for public-key infrastructures for production environments in the post-quantum era

SE Yunakovsky, M Kot, N Pozhar, D Nabokov… - EPJ Quantum …, 2021 - Springer
Quantum computing technologies pose a significant threat to the currently employed public-
key cryptography protocols. In this paper, we discuss the impact of the quantum threat on …

Masking kyber: First-and higher-order implementations

JW Bos, M Gourjon, J Renes, T Schneider… - IACR Transactions on …, 2021 - incs.ub.rub.de
In the final phase of the post-quantum cryptography standardization effort, the focus has
been extended to include the side-channel resistance of the candidates. While some …

Quantum analysis of AES

K Jang, A Baksi, H Kim, G Song, H Seo… - Cryptology ePrint …, 2022 - eprint.iacr.org
Quantum computing is considered among the next big leaps in computer science. While a
fully functional quantum computer is still in the future, there is an ever-growing need to …

Post-quantum TLS without handshake signatures

P Schwabe, D Stebila, T Wiggers - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
We present KEMTLS, an alternative to the TLS 1.3 handshake that uses key-encapsulation
mechanisms (KEMs) instead of signatures for server authentication. Among existing post …

LWE with side information: attacks and concrete security estimation

D Dachman-Soled, L Ducas, H Gong… - Annual International …, 2020 - Springer
We propose a framework for cryptanalysis of lattice-based schemes, when side information—
in the form of “hints”—about the secret and/or error is available. Our framework generalizes …

Masked accelerators and instruction set extensions for post-quantum cryptography

T Fritzmann, M Van Beirendonck… - IACR …, 2022 - philosophymindscience.org
Side-channel attacks can break mathematically secure cryptographic systems leading to a
major concern in applied cryptography. While the cryptanalysis and security evaluation of …

Estimate all the {LWE, NTRU} schemes!

MR Albrecht, BR Curtis, A Deo, A Davidson… - … and Cryptography for …, 2018 - Springer
We consider all LWE-and NTRU-based encryption, key encapsulation, and digital signature
schemes proposed for standardisation as part of the Post-Quantum Cryptography process …

Benchmarking post-quantum cryptography in TLS

C Paquin, D Stebila, G Tamvada - … , PQCrypto 2020, Paris, France, April 15 …, 2020 - Springer
Post-quantum cryptographic primitives have a range of trade-offs compared to traditional
public key algorithms, either having slower computation or larger public keys and …

A side-channel-resistant implementation of SABER

MV Beirendonck, JP D'anvers, A Karmakar… - ACM Journal on …, 2021 - dl.acm.org
The candidates for the NIST Post-Quantum Cryptography standardization have undergone
extensive studies on efficiency and theoretical security, but research on their side-channel …

Attacking and defending masked polynomial comparison for lattice-based cryptography

S Bhasin, JP D'Anvers, D Heinz… - IACR Transactions on …, 2021 - tches.iacr.org
In this work, we are concerned with the hardening of post-quantum key encapsulation
mechanisms (KEM) against side-channel attacks, with a focus on the comparison operation …