More practical single-trace attacks on the number theoretic transform
From MaRDI portal
Publication:2284110
DOI10.1007/978-3-030-30530-7_7zbMath1453.94110OpenAlexW2972972326MaRDI QIDQ2284110
Publication date: 14 January 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-30530-7_7
Related Items (5)
A side-channel secret key recovery attack on CRYSTALS-Kyber using \(k\) chosen ciphertexts ⋮ Systematic study of decryption and re-encryption leakage: the case of Kyber ⋮ ASCA vs. SASCA. A closer look at the AES key schedule ⋮ Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures ⋮ Fault-enabled chosen-ciphertext attacks on Kyber
This page was built for publication: More practical single-trace attacks on the number theoretic transform