© 2016, Springer-Verlag Berlin Heidelberg. In this paper, we propose a masking scheme to protect ring-LWE decryption from first-order side-channel attacks. In an unprotected ring-LWE decryption, the recovered plaintext is computed by first performing polynomial arithmetic on the secret key and then decoding the result. We mask the polynomial operations by arithmetically splitting the secret key polynomial into two random shares; the final decoding operation is performed using a new bespoke masked decoder. The outputs of our masked ring-LWE decryption are Boolean shares suitable for derivation of a symmetric key. Thus, the masking scheme keeps all intermediates, including the recovered plaintext, in the masked domain. We have implemented the...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. Side-ch...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Lattice-based cryptography has been proposed as a postquantum public-key cryptosystem. In this paper...
Abstract. Lattice-based cryptography has been proposed as a postquan-tum public-key cryptosystem. In...
© International Association for Cryptologic Research 2015. Lattice-based cryptography has been propo...
© Springer International Publishing Switzerland 2016. In this paper, we present a new masking scheme...
During the last years public-key encryption schemes based on the hardness of ring-LWE have gained si...
Masking is the central topic of this thesis based on publications. Masking is a technique that allow...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
Abstract. Instantiations of the McEliece cryptosystem which are considered computationally secure ev...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
Instantiations of the McEliece cryptosystem which are considered computationally secure even in a po...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. Side-ch...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Lattice-based cryptography has been proposed as a postquantum public-key cryptosystem. In this paper...
Abstract. Lattice-based cryptography has been proposed as a postquan-tum public-key cryptosystem. In...
© International Association for Cryptologic Research 2015. Lattice-based cryptography has been propo...
© Springer International Publishing Switzerland 2016. In this paper, we present a new masking scheme...
During the last years public-key encryption schemes based on the hardness of ring-LWE have gained si...
Masking is the central topic of this thesis based on publications. Masking is a technique that allow...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They ...
Abstract. Instantiations of the McEliece cryptosystem which are considered computationally secure ev...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
Instantiations of the McEliece cryptosystem which are considered computationally secure even in a po...
Abstract. Masking is a well-known countermeasure to protect block cipher implementations against sid...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. Side-ch...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...