Post-quantum lattice-based cryptography implementations: A survey

H Nejatollahi, N Dutt, S Ray, F Regazzoni… - ACM Computing …, 2019 - dl.acm.org
The advent of quantum computing threatens to break many classical cryptographic
schemes, leading to innovations in public key cryptography that focus on post-quantum …

Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM

JP D'Anvers, A Karmakar, S Sinha Roy… - Progress in Cryptology …, 2018 - Springer
In this paper, we introduce Saber, a package of cryptographic primitives whose security
relies on the hardness of the Module Learning With Rounding problem (Mod-LWR). We first …

LWE with side information: attacks and concrete security estimation

D Dachman-Soled, L Ducas, H Gong… - Annual International …, 2020 - Springer
We propose a framework for cryptanalysis of lattice-based schemes, when side information—
in the form of “hints”—about the secret and/or error is available. Our framework generalizes …

Estimate all the {LWE, NTRU} schemes!

MR Albrecht, BR Curtis, A Deo, A Davidson… - … and Cryptography for …, 2018 - Springer
We consider all LWE-and NTRU-based encryption, key encapsulation, and digital signature
schemes proposed for standardisation as part of the Post-Quantum Cryptography process …

A side-channel-resistant implementation of SABER

MV Beirendonck, JP D'anvers, A Karmakar… - ACM Journal on …, 2021 - dl.acm.org
The candidates for the NIST Post-Quantum Cryptography standardization have undergone
extensive studies on efficiency and theoretical security, but research on their side-channel …

LAC: Practical ring-LWE based public-key encryption with byte-level modulus

X Lu, Y Liu, Z Zhang, D Jia, H Xue, J He, B Li… - Cryptology ePrint …, 2018 - eprint.iacr.org
We propose an instantiation of public key encryption scheme based on the ring learning with
error problem, where the modulus is at a byte level and the noise is at a bit level, achieving …

Efficient error detection architectures for postquantum signature falcon's sampler and KEM SABER

A Sarker, MM Kermani… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Among the National Institute for Standards and Technology (NIST) postquantum
cryptography (PQC) standardization Round 3 finalists (announced in 2020 and anticipated …

Timing attacks on error correcting codes in post-quantum schemes

JP D'Anvers, M Tiepelt, F Vercauteren… - Proceedings of ACM …, 2019 - dl.acm.org
While error correcting codes (ECC) have the potential to significantly reduce the failure
probability of post-quantum schemes, they add an extra ECC decoding step to the algorithm …

Decryption failure attacks on IND-CCA secure lattice-based schemes

JP D'Anvers, Q Guo, T Johansson, A Nilsson… - … -Key Cryptography–PKC …, 2019 - Springer
In this paper we investigate the impact of decryption failures on the chosen-ciphertext
security of lattice-based primitives. We discuss a generic framework for secret key recovery …

Fault attacks on CCA-secure lattice KEMs

P Pessl, L Prokop - IACR Transactions on Cryptographic Hardware …, 2021 - incs.ub.rub.de
NIST's post-quantum standardization effort very recently entered its final round. This makes
studying the implementation-security aspect of the remaining candidates an increasingly …