[PDF][PDF] On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery and Key Recovery Attacks.

P Ravi, S Bhasin, SS Roy… - IACR Cryptol. ePrint …, 2020 - scholar.archive.org
With the NIST Post quantum cryptog-raphy competition in final round, the importance of
implementation security is highlighted in the latest call. In this regard, we report practical …

On exploiting message leakage in (few) NIST PQC candidates for practical message recovery attacks

P Ravi, S Bhasin, SS Roy… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this work, we propose generic and practical side-channel attacks for message recovery in
post-quantum lattice-based public key encryption (PKE) and key encapsulation mechanisms …

Stamp-single trace attack on m-lwe pointwise multiplication in kyber

B Yang, P Ravi, F Zhang, A Shen… - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In this work, we propose a novel single-trace key recovery attack targeting side-channel
leakage from the key-generation and encryption procedure of Kyber KEM. Our attack …

A side-channel attack on a masked IND-CCA secure saber KEM implementation

K Ngo, E Dubrova, Q Guo, T Johansson - IACR Transactions on …, 2021 - tches.iacr.org
In this paper, we present a side-channel attack on a first-order masked implementation of
IND-CCA secure Saber KEM. We show how to recover both the session key and the long …

Practical CCA2-secure and masked ring-LWE implementation

T Oder, T Schneider, T Pöppelmann… - Cryptology ePrint …, 2016 - eprint.iacr.org
During the last years public-key encryption schemes based on the hardness of ring-LWE
have gained significant popularity. For real-world security applications assuming strong …

SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets

CY Li, J Sotáková, E Wenger, M Malhou… - Proceedings of the …, 2023 - dl.acm.org
Learning with Errors (LWE) is a hard math problem underpinning many proposed post-
quantum cryptographic (PQC) systems. The only PQC Key Exchange Mechanism (KEM) …

Number “Not Used” Once - Practical Fault Attack on pqm4 Implementations of NIST Candidates

P Ravi, DB Roy, S Bhasin, A Chattopadhyay… - … Side-Channel Analysis …, 2019 - Springer
In this paper, we demonstrate practical fault attacks over a number of lattice-based schemes,
in particular NewHope, Kyber, Frodo, Dilithium which are based on the hardness of the …

Pushing the limits of generic side-channel attacks on LWE-based KEMs-parallel PC oracle attacks on Kyber KEM and beyond

G Rajendran, P Ravi, JP D'anvers, S Bhasin… - IACR Transactions on …, 2023 - dr.ntu.edu.sg
In this work, we propose generic and novel adaptations to the binary Plaintext-Checking
(PC) oracle based side-channel attacks for Kyber KEM. These attacks operate in a chosen …

Lightweight and DPA-resistant post-quantum cryptoprocessor based on binary ring-LWE

S Ebrahimi, S Bayat-Sarmadi - 2020 20th International …, 2020 - ieeexplore.ieee.org
With the exponential growth in the internet of things (IoT) applications such as smart city and
e-health, more embedded devices and smart nodes are connected to the network. In order …

Chosen ciphertext simple power analysis on software 8-bit implementation of ring-LWE encryption

A Park, DG Han - 2016 IEEE Asian Hardware-Oriented Security …, 2016 - ieeexplore.ieee.org
Post-quantum cryptographic schemes have been developed in response to the rise of
quantum computers. Fortunately, several schemes have been developed with quantum …