[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

Protecting dilithium against leakage: Revisited sensitivity analysis and improved implementations

M Azouaoui, O Bronchain… - IACR …, 2023 - philosophymindscience.org
CRYSTALS-Dilithium has been selected by the NIST as the new standard for post-quantum
digital signatures. In this work, we revisit the side-channel countermeasures of Dilithium in …

Side-channel and fault-injection attacks over lattice-based post-quantum schemes (Kyber, Dilithium): Survey and new results

P Ravi, A Chattopadhyay, JP D'Anvers… - ACM Transactions on …, 2024 - dl.acm.org
In this work, we present a systematic study of Side-Channel Attacks (SCA) and Fault
Injection Attacks (FIA) on structured lattice-based schemes, with main focus on Kyber Key …

Pushing the limits of generic side-channel attacks on LWE-based KEMs-parallel PC oracle attacks on Kyber KEM and beyond

G Rajendran, P Ravi, JP D'anvers, S Bhasin… - IACR Transactions on …, 2023 - dr.ntu.edu.sg
In this work, we propose generic and novel adaptations to the binary Plaintext-Checking
(PC) oracle based side-channel attacks for Kyber KEM. These attacks operate in a chosen …

[HTML][HTML] Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols

Y Baseri, V Chouhan, A Hafid - Computers & Security, 2024 - Elsevier
The emergence of quantum computing poses a formidable security challenge to network
protocols traditionally safeguarded by classical cryptographic algorithms. This paper …

Sca-ldpc: A code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes

Q Guo, D Nabokov, A Nilsson, T Johansson - International Conference on …, 2023 - Springer
Whereas theoretical attacks on standardized cryptographic primitives rarely lead to actual
practical attacks, the situation is different for side-channel attacks. Improvements in the …

Find the bad apples: An efficient method for perfect key recovery under imperfect sca oracles–a case study of kyber

M Shen, C Cheng, X Zhang, Q Guo… - IACR Transactions on …, 2023 - tches.iacr.org
Side-channel resilience is a crucial feature when assessing whether a postquantum
cryptographic proposal is sufficiently mature to be deployed. In this paper, we propose a …

Fault-enabled chosen-ciphertext attacks on Kyber

J Hermelink, P Pessl, T Pöppelmann - … on Cryptology in India, Jaipur, India …, 2021 - Springer
NIST's PQC standardization process is in the third round, and a first final choice between
one of three remaining lattice-based key-encapsulation mechanisms is expected by the end …

Fiddling the twiddle constants-fault injection analysis of the number theoretic transform

P Ravi, B Yang, S Bhasin, F Zhang… - IACR Transactions on …, 2023 - dr.ntu.edu.sg
In this work, we present the first fault injection analysis of the Number Theoretic Transform
(NTT). The NTT is an integral computation unit, widely used for polynomial multiplication in …

Adapting belief propagation to counter shuffling of NTTs

J Hermelink, S Streit, E Strieder… - IACR Transactions on …, 2023 - tches.iacr.org
Abstract The Number Theoretic Transform (NTT) is a major building block in recently
introduced lattice based post-quantum (PQ) cryptography. The NTT was target of a number …