Fault-enabled chosen-ciphertext attacks on Kyber
From MaRDI portal
Publication:6157594
DOI10.1007/978-3-030-92518-5_15zbMath1514.94100OpenAlexW4205974385MaRDI QIDQ6157594
Peter Pessl, Julius Hermelink, Thomas Pöppelmann
Publication date: 12 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://zenodo.org/record/5718027
Related Items (2)
Cites Work
- Unnamed Item
- Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
- A modular analysis of the Fujisaki-Okamoto transformation
- A masked ring-LWE implementation
- A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
- More practical single-trace attacks on the number theoretic transform
- Assessment of the key-reuse resilience of NewHope
- Worst-case to average-case reductions for module lattices
- Soft Analytical Side-Channel Attacks
- BKZ 2.0: Better Lattice Security Estimates
- Secure integration of asymmetric and symmetric encryption schemes
- Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
- On Ideal Lattices and Learning with Errors over Rings
This page was built for publication: Fault-enabled chosen-ciphertext attacks on Kyber