Profiling side-channel attacks on Dilithium. A small bit-fiddling leak breaks it all
From MaRDI portal
Publication:6619833
DOI10.1007/978-3-031-58411-4_1zbMATH Open1547.94424MaRDI QIDQ6619833
Jean-Pierre Seifert, Soundes Marzougui, Mehdi Tibouchi, Unnamed Author
Publication date: 16 October 2024
integer linear programmingmachine learningside-channel analysislattice-based cryptographyprofiling attacksDilithium
Integer programming (90C10) Learning and adaptive systems in artificial intelligence (68T05) Linear programming (90C05) Cryptography (94A60) Channel models (including quantum) in information and communication theory (94A40)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Hyperband: A Novel Bandit-Based Approach to Hyperparameter Optimization
- LWE without modular reduction and improved side-channel attacks against BLISS
- Breaking cryptographic implementations using deep learning techniques
- Security of hedged Fiat-Shamir signatures under fault attacks
- LWE with side information: attacks and concrete security estimation
- How to meet ternary LWE keys
- How to find ternary LWE keys using locality sensitive hashing
- \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}
- Approximate trapdoors for lattices and smaller hash-and-sign signatures
- Masking Dilithium. Efficient implementation and side-channel evaluation
- ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research
- Lattice Signatures and Bimodal Gaussians
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- Efficient Identity-Based Encryption over NTRU Lattices
- Trapdoors for hard lattices and new cryptographic constructions
- Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
- Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
- An Improved Compression Technique for Signatures Based on Learning with Errors
- On lattices, learning with errors, random linear codes, and cryptography
This page was built for publication: Profiling side-channel attacks on Dilithium. A small bit-fiddling leak breaks it all