International audienceIn this paper, we initiate the study of side-channel leakage in hash-and-sign lattice-based signatures, with particular emphasis on the two efficient implementations of the original GPV lattice-trapdoor paradigm for signatures, namely NIST second-round candidate Falcon and its simpler predecessor DLP. Both of these schemes implement the GPV signature scheme over NTRU lattices, achieving great speed-ups over the general lattice case. Our results are mainly threefold. First, we identify a specific source of side-channel leakage in most implementations of those schemes, namely, the one-dimensional Gaussian sampling steps within lattice Gaussian sampling. It turns out that the implementations of these steps often leak the ...
International audienceRecently, numerous physical attacks have been demonstrated against lattice-bas...
International audienceThis work describes the MITAKA signature scheme: a new hash-and-sign signature...
International audienceRecently, numerous physical attacks have been demonstrated against lattice-bas...
International audienceIn this paper, we initiate the study of side-channel leakage in hash-and-sign ...
International audienceIn this paper, we initiate the study of side-channel leakage in hash-and-sign ...
International audienceIn this paper, we initiate the study of side-channel leakage in hash-and-sign ...
International audienceInitial attempts to obtain lattice based signatures were closely related to re...
Initial attempts to obtain lattice based signatures were closely related to reducing a vector modulo...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
The Peregrine signature scheme is one of the candidates in the ongoing Korean post-quantum cryptogra...
Lattice-based cryptography has generated considerable interest in the last two decades due toattract...
International audienceRecently, numerous physical attacks have been demonstrated against lattice-bas...
International audienceRecently, numerous physical attacks have been demonstrated against lattice-bas...
International audienceThis work describes the MITAKA signature scheme: a new hash-and-sign signature...
International audienceRecently, numerous physical attacks have been demonstrated against lattice-bas...
International audienceIn this paper, we initiate the study of side-channel leakage in hash-and-sign ...
International audienceIn this paper, we initiate the study of side-channel leakage in hash-and-sign ...
International audienceIn this paper, we initiate the study of side-channel leakage in hash-and-sign ...
International audienceInitial attempts to obtain lattice based signatures were closely related to re...
Initial attempts to obtain lattice based signatures were closely related to reducing a vector modulo...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
The Peregrine signature scheme is one of the candidates in the ongoing Korean post-quantum cryptogra...
Lattice-based cryptography has generated considerable interest in the last two decades due toattract...
International audienceRecently, numerous physical attacks have been demonstrated against lattice-bas...
International audienceRecently, numerous physical attacks have been demonstrated against lattice-bas...
International audienceThis work describes the MITAKA signature scheme: a new hash-and-sign signature...
International audienceRecently, numerous physical attacks have been demonstrated against lattice-bas...