In the search for post-quantum secure alternatives to RSA and ECC, lattice-based cryptography appears to be an attractive and efficient option. A particularly interesting lattice-based signature scheme is BLISS, offering key and signature sizes in the range of RSA moduli. A range of works on efficient implementations of BLISS is available, and the scheme has seen a first real-world adoption in strongSwan, an IPsec-based VPN suite. In contrast, the implementation-security aspects of BLISS, and lattice-based cryptography in general, are still largely unexplored.At CHES 2016, Groot Bruinderink et al. presented the first side-channel attack on BLISS, thus proving that this topic cannot be neglected. Nevertheless, their attack has some limitatio...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
We present a side-channel attack on CRYSTALS-Dilithium, a post-quantum secure digital signature sche...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
In the search for post-quantum secure alternatives to RSA and ECC, lattice-based cryptography appear...
Session I1: Post-QuantumIn the search for post-quantum secure alternatives to RSA and ECC, lattice-b...
In this paper, we investigate the security of the BLISS lattice-based signature scheme, one of the m...
International audienceIn this paper, we investigate the security of the BLISS lattice-based signatur...
We present the first side-channel attack on a lattice-based signature scheme, using the FLUSH+RELOAD...
International audienceAbstract As one of the most efficient lattice-based signature schemes, and one...
As the advent of general-purpose quantum computers appears to be drawing closer, agencies and adviso...
International audienceAs the advent of general-purpose quantum computers appears to be drawing close...
Digital signatures are indispensable for security on the Internet, because they guarantee authentici...
In a future full of quantum computers, new foundations for asymmetric cryptography are needed. We st...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
The notion of key substitution security on digital signatures in the multiuser setting has been prop...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
We present a side-channel attack on CRYSTALS-Dilithium, a post-quantum secure digital signature sche...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
In the search for post-quantum secure alternatives to RSA and ECC, lattice-based cryptography appear...
Session I1: Post-QuantumIn the search for post-quantum secure alternatives to RSA and ECC, lattice-b...
In this paper, we investigate the security of the BLISS lattice-based signature scheme, one of the m...
International audienceIn this paper, we investigate the security of the BLISS lattice-based signatur...
We present the first side-channel attack on a lattice-based signature scheme, using the FLUSH+RELOAD...
International audienceAbstract As one of the most efficient lattice-based signature schemes, and one...
As the advent of general-purpose quantum computers appears to be drawing closer, agencies and adviso...
International audienceAs the advent of general-purpose quantum computers appears to be drawing close...
Digital signatures are indispensable for security on the Internet, because they guarantee authentici...
In a future full of quantum computers, new foundations for asymmetric cryptography are needed. We st...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
The notion of key substitution security on digital signatures in the multiuser setting has been prop...
Lattice signature schemes generally require particular care when it comes to preventing secret infor...
We present a side-channel attack on CRYSTALS-Dilithium, a post-quantum secure digital signature sche...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...