Secure Implementation of Lattice-Based Encryption Schemes
From MaRDI portal
Publication:6181721
DOI10.1007/978-3-030-20323-8_2zbMath1528.94073OpenAlexW2960990695MaRDI QIDQ6181721
Tim Güneysu, Tobias Schneider, Tobias Oder
Publication date: 23 January 2024
Published in: Advanced Boolean Techniques (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-20323-8_2
public-key cryptographyside-channel analysispost-quantum cryptographylearning with errorsmicrocontroller implementation
Cites Work
- Unnamed Item
- Unnamed Item
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- A masked ring-LWE implementation
- Additively Homomorphic Ring-LWE Masking
- Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance
- Lattice Cryptography for the Internet
- Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity
- Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware
- The World Is Not Enough: Another Look on Second-Order DPA
- Better Key Sizes (and Attacks) for LWE-Based Encryption
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- On Ideal Lattices and Learning with Errors over Rings
- Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking
- On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes
- Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
- Keccak
- Secure integration of asymmetric and symmetric encryption schemes
- Statistical Analysis of Second Order Differential Power Analysis
- High-Order Conversion from Boolean to Arithmetic Masking
- Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
- Enhanced Lattice-Based Signatures on Reconfigurable Hardware
- Compact Ring-LWE Cryptoprocessor
- Advances in Cryptology - CRYPTO 2003
- On lattices, learning with errors, random linear codes, and cryptography
This page was built for publication: Secure Implementation of Lattice-Based Encryption Schemes