Single trace analysis of comparison operation based constant-time CDT sampling and its countermeasure
From MaRDI portal
Publication:6547866
DOI10.1007/978-981-97-1235-9_10MaRDI QIDQ6547866
Jaeseung Han, Jaewon Huh, Ju-Hwan Kim, Dong-Guk Han, Keon Choi
Publication date: 31 May 2024
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Lizard: cut off the tail -- a practical post-quantum public-key encryption from LWE and LWR
- \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}
- Efficiently masking binomial sampling at arbitrary orders for lattice-based crypto
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Isochronous Gaussian Sampling: From Inception to Implementation
- On lattices, learning with errors, random linear codes, and cryptography
- On the feasibility of single-trace attacks on the Gaussian sampler using a CDT
This page was built for publication: Single trace analysis of comparison operation based constant-time CDT sampling and its countermeasure
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6547866)