In the final phase of the post-quantum cryptography standardization effort, the focus has been extended to include the side-channel resistance of the candidates. While some …
S Faust, V Grosso, SMD Pozo, C Paglialonga… - 2018 - repository.ubn.ru.nl
Composability and robustness against physical defaults (eg, glitches) are two highly desirable properties for secure implementations of masking schemes. While tools exist to …
The design of glitch-resistant higher-order masking schemes is an important challenge in cryptographic engineering. A recent work by Moos et al.(CHES 2019) showed that most …
O Bronchain, G Cassiers - IACR Transactions on Cryptographic …, 2022 - tches.iacr.org
The performance of higher-order masked implementations of lattice-based based key encapsulation mechanisms (KEM) is currently limited by the costly conversions between …
We investigate the relationships between theoretical studies of leaking cryptographic devices and concrete security evaluations with standard side-channel attacks. Our …
This work describes the Mitaka signature scheme: a new hash-and-sign signature scheme over NTRU lattices which can be seen as a variant of NIST finalist Falcon. It achieves …
T Oder, T Schneider, T Pöppelmann… - Cryptology ePrint …, 2016 - eprint.iacr.org
During the last years public-key encryption schemes based on the hardness of ring-LWE have gained significant popularity. For real-world security applications assuming strong …
Masking requires splitting sensitive variables into at least d+ 1 shares to provide security against DPA attacks at order d. To this date, this minimal number has only been deployed in …
In this paper, we provide a necessary clarification of the good security properties that can be obtained from parallel implementations of masking schemes. For this purpose, we first argue …