Systematic study of decryption and re-encryption leakage: the case of Kyber
From MaRDI portal
Publication:6086403
DOI10.1007/978-3-030-99766-3_11zbMath1528.94030OpenAlexW4221134967MaRDI QIDQ6086403
François-Xavier Standaert, Yulia Kuzovkova, Melissa Azouaoui, Olivier Bronchain, Tobias Schneider, Clément Hoffmann
Publication date: 12 December 2023
Published in: Constructive Side-Channel Analysis and Secure Design (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-99766-3_11
maskingpost-quantum cryptographyside-channel attackskey encapsulation mechanismFujisaki-Okamoto transformation
Cites Work
- Masking proofs are tight and how to exploit it in security evaluations
- A modular analysis of the Fujisaki-Okamoto transformation
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes
- More practical single-trace attacks on the number theoretic transform
- Worst-case to average-case reductions for module lattices
- Soft Analytical Side-Channel Attacks
- Making Masking Security Proofs Concrete
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Masking against Side-Channel Attacks: A Formal Security Proof
- Keccak
- Towards sound approaches to counteract power-analysis attacks
- Secure integration of asymmetric and symmetric encryption schemes
- Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
- An Algorithm for the Machine Calculation of Complex Fourier Series
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- Advances in Cryptology - CRYPTO 2003
This page was built for publication: Systematic study of decryption and re-encryption leakage: the case of Kyber