[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

Bitslicing arithmetic/Boolean masking conversions for fun and profit: with application to lattice-based KEMs

O Bronchain, G Cassiers - IACR Transactions on Cryptographic …, 2022 - tches.iacr.org
The performance of higher-order masked implementations of lattice-based based key
encapsulation mechanisms (KEM) is currently limited by the costly conversions between …

Revisiting higher-order masked comparison for lattice-based cryptography: Algorithms and bit-sliced implementations

JP D'Anvers, M Van Beirendonck… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Masked comparison is one of the most expensive operations in side-channel secure
implementations of lattice-based post-quantum cryptography, especially for higher masking …

High-order polynomial comparison and masking lattice-based encryption

JS Coron, F Gérard, S Montoya, R Zeitoun - Cryptology ePrint Archive, 2021 - eprint.iacr.org
The main protection against side-channel attacks consists in computing every function with
multiple shares via the masking countermeasure. For IND-CCA secure lattice-based …

High-order masking of lattice signatures in quasilinear time

R del Pino, T Prest, M Rossi… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
In recent years, lattice-based signature schemes have emerged as the most prominent post-
quantum solutions, as illustrated by NIST's selection of Falcon and Dilithium for …

Improved gadgets for the high-order masking of dilithium

JS Coron, F Gérard, M Trannoy… - IACR Transactions on …, 2023 - tches.iacr.org
We present novel and improved high-order masking gadgets for Dilithium, a post-quantum
signature scheme that has been standardized by the National Institute of Standards and …

Post-quantum authenticated encryption against chosen-ciphertext side-channel attacks

M Azouaoui, Y Kuzovkova, T Schneider… - Cryptology ePrint …, 2022 - eprint.iacr.org
Over the last years, the side-channel analysis of Post-Quantum Cryptography (PQC)
candidates in the NIST standardization initiative has received increased attention. In …

High-order masking of NTRU

JS Coron, F Gérard, M Trannoy… - IACR Transactions on …, 2023 - tches.iacr.org
The main protection against side-channel attacks consists in computing every function with
multiple shares via the masking countermeasure. While the masking countermeasure was …

Formal verification of arithmetic masking in hardware and software

B Gigerl, R Primas, S Mangard - International Conference on Applied …, 2023 - Springer
Masking is a popular countermeasure to protect cryptographic implementations against
physical attacks like differential power analysis. So far, research focused on Boolean …

X2X: Low-Randomness and High-Throughput A2B and B2A Conversions for shares in Hardware

Q Norga, JP D'Anvers, S Kundu… - Cryptology ePrint …, 2024 - eprint.iacr.org
The conversion between arithmetic and Boolean masking representations (A2B\& B2A) is a
crucial component for side-channel resistant implementations of lattice-based (post …