Generic side-channel attacks on CCA-secure lattice-based PKE and KEMs

P Ravi, SS Roy, A Chattopadhyay… - IACR transactions on …, 2020 - tches.iacr.org
In this work, we demonstrate generic and practical EM side-channel assisted chosen
ciphertext attacks over multiple LWE/LWR-based Public Key Encryption (PKE) and Key …

Magnifying side-channel leakage of lattice-based cryptosystems with chosen ciphertexts: The case study of kyber

Z Xu, O Pemberton, SS Roy, D Oswald… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Lattice-based cryptography, as an active branch of post-quantum cryptography (PQC), has
drawn great attention from side-channel analysis researchers in recent years. Despite the …

Lattice-based key-sharing schemes: A survey

P Ravi, J Howe, A Chattopadhyay… - ACM Computing Surveys …, 2021 - dl.acm.org
Public-key cryptography is an indispensable component used in almost all of our present-
day digital infrastructure. However, most if not all of it is predominantly built upon hardness …

Towards post-quantum security for signal's X3DH handshake

J Brendel, M Fischlin, F Günther, C Janson… - Selected Areas in …, 2021 - Springer
Modern key exchange protocols are usually based on the Diffie–Hellman (DH) primitive. The
beauty of this primitive, among other things, is its potential reusage of key shares: DH shares …

A complete and optimized key mismatch attack on NIST candidate NewHope

Y Qin, C Cheng, J Ding - European symposium on research in computer …, 2019 - Springer
Abstract In CT-RSA 2019, Bauer et al. have analyzed the case when the public key is reused
for the NewHope key encapsulation mechanism (KEM), a second-round candidate in the …

Security of two NIST candidates in the presence of randomness reuse

K Wang, Z Zhang, H Jiang - … 2020, Singapore, November 29–December 1 …, 2020 - Springer
Abstract The National Institute of Standards and Technology (NIST) is working on the
standardization of post-quantum algorithms. In February 2019, NIST announced 26 …

[PDF][PDF] 一种针对格基后量子密码的能量侧信道分析框架

胡伟, 袁超绚, 郑健, 王省欣, 李倍倍, 唐时博 - 电子与信息学报, 2023 - jeit.ac.cn
为应对量子计算对传统公钥密码的安全威胁, 后量子密码(PQC) 已逐渐成为新一代密码技术.
虽然后量子密码通过数学理论保证了算法的安全性, 但在密码实现运算过程中易发生侧信道信息 …

A simple and efficient key reuse attack on NTRU cryptosystem

J Ding, J Deaton, K Schmidt, Z Zhang - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Abstract In 1998, Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman introduced the
famous NTRU cryptosystem, and called it" A ring-based public key cryptosystem". Actually, it …

[PDF][PDF] Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.

J Brendel, M Fischlin, F Günther… - IACR Cryptol …, 2019 - files.douglas.stebila.ca.s3 …
Modern key exchange protocols are usually based on the Diffie–Hellman (DH) primitive. The
beauty of this primitive, among other things, is its potential reusage of key shares: DH shares …

Key recovery under plaintext checking attack on LAC

K Wang, Z Zhang, H Jiang - … 2020, Singapore, November 29–December 1 …, 2020 - Springer
Abstract The National Institute of Standards and Technology (NIST) is working on the
standardization of post-quantum algorithms. In February 2019, NIST announced 26 …