In this work, we propose generic and practical side-channel attacks for message recovery in post-quantum lattice-based public key encryption (PKE) and key encapsulation mechanisms …
B Yang, P Ravi, F Zhang, A Shen… - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In this work, we propose a novel single-trace key recovery attack targeting side-channel leakage from the key-generation and encryption procedure of Kyber KEM. Our attack …
In this paper, we present a side-channel attack on a first-order masked implementation of IND-CCA secure Saber KEM. We show how to recover both the session key and the long …
T Oder, T Schneider, T Pöppelmann… - Cryptology ePrint …, 2016 - eprint.iacr.org
During the last years public-key encryption schemes based on the hardness of ring-LWE have gained significant popularity. For real-world security applications assuming strong …
Learning with Errors (LWE) is a hard math problem underpinning many proposed post- quantum cryptographic (PQC) systems. The only PQC Key Exchange Mechanism (KEM) …
In this paper, we demonstrate practical fault attacks over a number of lattice-based schemes, in particular NewHope, Kyber, Frodo, Dilithium which are based on the hardness of the …
In this work, we propose generic and novel adaptations to the binary Plaintext-Checking (PC) oracle based side-channel attacks for Kyber KEM. These attacks operate in a chosen …
With the exponential growth in the internet of things (IoT) applications such as smart city and e-health, more embedded devices and smart nodes are connected to the network. In order …
A Park, DG Han - 2016 IEEE Asian Hardware-Oriented Security …, 2016 - ieeexplore.ieee.org
Post-quantum cryptographic schemes have been developed in response to the rise of quantum computers. Fortunately, several schemes have been developed with quantum …