International audienceAlthough postquantum cryptography is of growing practical concern, not many works have been devoted to implementation security issues related to postquantum schemes. In this paper, we look in particular at fault attacks against implementations of lattice-based signatures and key exchange protocols. For signature schemes, we are interested both in Fiat-Shamir type constructions (particularly BLISS, but also GLP, PASSSign, and Ring-TESLA) and in hash-and-sign schemes (particularly the GPV-based scheme of Ducas-Prest-Lyubashevsky). For key exchange protocols, we study the implementations of NewHope, Frodo, and Kyber. These schemes form a representative sample of modern, practical lattice-based signatures and key exchange ...
In the search for post-quantum secure alternatives to RSA and ECC, lattice-based cryptography appear...
International audiencePost-Quantum Cryptography (PQC) will become soon the standard for many systems...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
International audienceAlthough postquantum cryptography is of growing practical concern, not many wo...
International audienceAs the advent of general-purpose quantum computers appears to be drawing close...
As the advent of general-purpose quantum computers appears to be drawing closer, agencies and adviso...
At SAC 2016, Espitau et al. presented a loop-abort fault attack against lattice-based signature sche...
In this paper, we extend the applicability of differential fault attacks to lattice-based cryptograp...
The advent of quantum computers and the exponential speed-up of quantum computation will render clas...
NIST's PQC standardization process is in the third round, and a first final choice between one of th...
The notion of key substitution security on digital signatures in the multiuser setting has been prop...
International audienceSince the introduction of the LLL algorithm in 1982, lattice reduction has pro...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
Post-quantum cryptosystems are often designed starting from a public key encryption algorithm and au...
© International Association for Cryptologic Research 2019. In this paper we investigate the impact o...
In the search for post-quantum secure alternatives to RSA and ECC, lattice-based cryptography appear...
International audiencePost-Quantum Cryptography (PQC) will become soon the standard for many systems...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
International audienceAlthough postquantum cryptography is of growing practical concern, not many wo...
International audienceAs the advent of general-purpose quantum computers appears to be drawing close...
As the advent of general-purpose quantum computers appears to be drawing closer, agencies and adviso...
At SAC 2016, Espitau et al. presented a loop-abort fault attack against lattice-based signature sche...
In this paper, we extend the applicability of differential fault attacks to lattice-based cryptograp...
The advent of quantum computers and the exponential speed-up of quantum computation will render clas...
NIST's PQC standardization process is in the third round, and a first final choice between one of th...
The notion of key substitution security on digital signatures in the multiuser setting has been prop...
International audienceSince the introduction of the LLL algorithm in 1982, lattice reduction has pro...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
Post-quantum cryptosystems are often designed starting from a public key encryption algorithm and au...
© International Association for Cryptologic Research 2019. In this paper we investigate the impact o...
In the search for post-quantum secure alternatives to RSA and ECC, lattice-based cryptography appear...
International audiencePost-Quantum Cryptography (PQC) will become soon the standard for many systems...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...