Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
From MaRDI portal
Publication:5114647
DOI10.1007/978-3-319-66787-4_25zbMath1446.94155OpenAlexW2740580365MaRDI QIDQ5114647
Robert Primas, Peter Pessl, Stefan Mangard
Publication date: 24 June 2020
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-66787-4_25
Related Items (10)
Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4 ⋮ On the worst-case side-channel security of ECC point randomization in embedded devices ⋮ One-hot conversion: towards faster table-based A2B conversion ⋮ Systematic study of decryption and re-encryption leakage: the case of Kyber ⋮ ASCA vs. SASCA. A closer look at the AES key schedule ⋮ Fast first-order masked NTTRU ⋮ Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures ⋮ Fault-enabled chosen-ciphertext attacks on Kyber ⋮ Secure Implementation of Lattice-Based Encryption Schemes ⋮ Single-trace side-channel analysis on polynomial-based MAC schemes
This page was built for publication: Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption