The progress on constructing quantum computers and the ongoing standardization of post-quantum cryptography (PQC) have led to the development and refinement of promising new digital signature schemes and key encapsulation mechanisms (KEM). Especially lattice-based schemes have gained some popularity in the research community, presumably due to acceptable key, ciphertext, and signature sizes as well as good performance results and cryptographic strength. However, in some practical applications like smart cards, it is also crucial to secure cryptographic implementations against side-channel and fault attacks. In this work, we analyze the so-called redundant number representation (RNR) that can be used to counter side-channel attacks. We show ...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Modern cryptographic algorithms such as AES and RSA are effectively used for securing data transmiss...
In this paper, we demonstrate practical fault attacks over a number of lattice based schemes, in par...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
As the advent of general-purpose quantum computers appears to be drawing closer, agencies and adviso...
Lattice-based cryptography, as an active branch of post-quantum cryptography (PQC), has drawn great ...
Although lattice-based cryptography has proven to be a particularly efficient approach to post-quant...
This paper presents a novel and efficient way of exploiting side-channel leakage of masked implement...
CRYSTALS-Kyber is a key-encapsulation mechanism, whose security is based on the hardness of solving ...
International audienceAs the advent of general-purpose quantum computers appears to be drawing close...
In an effort to circumvent the high cost of standard countermeasures against side-channel attacks in...
As the message recovery-based attack poses a serious threat to lattice-based schemes, we conducted a...
International audiencePost-Quantum Cryptography (PQC) will become soon the standard for many systems...
Last year CRYSTALS-Kyber was chosen by NIST as a new, post-quantum secure key encapsulation mechanis...
The advent of quantum computers and the exponential speed-up of quantum computation will render clas...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Modern cryptographic algorithms such as AES and RSA are effectively used for securing data transmiss...
In this paper, we demonstrate practical fault attacks over a number of lattice based schemes, in par...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
As the advent of general-purpose quantum computers appears to be drawing closer, agencies and adviso...
Lattice-based cryptography, as an active branch of post-quantum cryptography (PQC), has drawn great ...
Although lattice-based cryptography has proven to be a particularly efficient approach to post-quant...
This paper presents a novel and efficient way of exploiting side-channel leakage of masked implement...
CRYSTALS-Kyber is a key-encapsulation mechanism, whose security is based on the hardness of solving ...
International audienceAs the advent of general-purpose quantum computers appears to be drawing close...
In an effort to circumvent the high cost of standard countermeasures against side-channel attacks in...
As the message recovery-based attack poses a serious threat to lattice-based schemes, we conducted a...
International audiencePost-Quantum Cryptography (PQC) will become soon the standard for many systems...
Last year CRYSTALS-Kyber was chosen by NIST as a new, post-quantum secure key encapsulation mechanis...
The advent of quantum computers and the exponential speed-up of quantum computation will render clas...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Modern cryptographic algorithms such as AES and RSA are effectively used for securing data transmiss...
In this paper, we demonstrate practical fault attacks over a number of lattice based schemes, in par...