Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures
From MaRDI portal
Publication:6145533
DOI10.1016/j.ic.2023.105112OpenAlexW4387807254MaRDI QIDQ6145533
Linir Zamir, Mehrdad Nojoumian, Ari Shaller
Publication date: 2 February 2024
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ic.2023.105112
post-quantum cryptographyside-channel attacksattacks on PQCPQC standardizationquantum-resistant algorithms
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Fuzzy matching template attacks on multivariate cryptography: a case study
- QC-MDPC: a timing attack and a CCA2 KEM
- FPGA-based Niederreiter cryptosystem using binary Goppa codes
- Grafting trees: a fault attack against the SPHINCS framework
- Loop-abort faults on supersingular isogeny cryptosystems
- Fault attack on supersingular isogeny cryptosystems
- A modular analysis of the Fujisaki-Okamoto transformation
- Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures
- CSIDH: an efficient post-quantum commutative group action
- Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman
- Fault analysis of the NTRUSign digital signature scheme
- More practical single-trace attacks on the number theoretic transform
- Differential Power Analysis of a McEliece Cryptosystem
- Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
- On the quaternion -isogeny path problem
- SPHINCS: Practical Stateless Hash-Based Signatures
- A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors
- Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
- List Decoding for Binary Goppa Codes
- On the Security of the Winternitz One-Time Signature Scheme
- Horizontal Correlation Analysis on Exponentiation
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- Differential Power Analysis of XMSS and SPHINCS
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Attacking and Defending the McEliece Cryptosystem
- A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes
- A Timing Attack against the Secret Permutation in the McEliece PKC
- Practical Power Analysis Attacks on Software Implementations of McEliece
- Generalized Compact Knapsacks Are Collision Resistant
- On the inherent intractability of certain coding problems (Corresp.)
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Area-Time Efficient Computation of Niederreiter Encryption on QC-MDPC Codes for Embedded Hardware
- A Key Recovery Reaction Attack on QC-MDPC
- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations
- Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
- W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes
- Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices
- Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
- Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE
- An Analysis of Goubin’s Refined Power Analysis Attack
- BLAKE-512-Based 128-Bit CCA2 Secure Timing Attack Resistant McEliece Cryptoprocessor
- Constructing elliptic curve isogenies in quantum subexponential time
- Identification protocols and signature schemes based on supersingular isogeny problems
- Fault attacks on UOV and Rainbow
This page was built for publication: Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures