In contrast to classical signature schemes, such as RSA or ECDSA signatures, the lattice-based signature scheme ring-TESLA is expected to be resistant even against quantum adversaries. Due to a recent key recovery from a lattice-based implementation, it becomes clear that cache side channels are a serious threat for lattice-based implementations. In this article, we analyze an existing implementation of ring-TESLA against cache side channels. To reduce the effort for manual code inspection, we selectively employ automated program analysis. The leakage bounds we compute with program analysis are sound overapproximations of cache-side-channel leakage. We detect four cache-side-channel vulnerabilities in the implementation of ring-TESLA. Since...
This paper presents a novel and efficient way of exploiting side-channel leakage of masked implement...
Lattice-based schemes are among the most promising post-quantum schemes, yet the effect of both para...
In the search for post-quantum secure alternatives to RSA and ECC, lattice-based cryptography appear...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
In this paper, we investigate the security of the BLISS lattice-based signature scheme, one of the m...
As the advent of general-purpose quantum computers appears to be drawing closer, agencies and adviso...
Lattice-based cryptography, as an active branch of post-quantum cryptography (PQC), has drawn great ...
Performance has been and will continue to be a key criterion in the development of computer systems ...
International audienceIn this paper, we investigate the security of the BLISS lattice-based signatur...
Digital signatures are indispensable for security on the Internet, because they guarantee authentici...
Abstract. Generally, lattice-based cryptographic primitives offer good performance and allow for str...
Session I1: Post-QuantumIn the search for post-quantum secure alternatives to RSA and ECC, lattice-b...
Modern cryptographic algorithms such as AES and RSA are effectively used for securing data transmiss...
International audienceAs the advent of general-purpose quantum computers appears to be drawing close...
Although lattice-based cryptography has proven to be a particularly efficient approach to post-quant...
This paper presents a novel and efficient way of exploiting side-channel leakage of masked implement...
Lattice-based schemes are among the most promising post-quantum schemes, yet the effect of both para...
In the search for post-quantum secure alternatives to RSA and ECC, lattice-based cryptography appear...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
In this paper, we investigate the security of the BLISS lattice-based signature scheme, one of the m...
As the advent of general-purpose quantum computers appears to be drawing closer, agencies and adviso...
Lattice-based cryptography, as an active branch of post-quantum cryptography (PQC), has drawn great ...
Performance has been and will continue to be a key criterion in the development of computer systems ...
International audienceIn this paper, we investigate the security of the BLISS lattice-based signatur...
Digital signatures are indispensable for security on the Internet, because they guarantee authentici...
Abstract. Generally, lattice-based cryptographic primitives offer good performance and allow for str...
Session I1: Post-QuantumIn the search for post-quantum secure alternatives to RSA and ECC, lattice-b...
Modern cryptographic algorithms such as AES and RSA are effectively used for securing data transmiss...
International audienceAs the advent of general-purpose quantum computers appears to be drawing close...
Although lattice-based cryptography has proven to be a particularly efficient approach to post-quant...
This paper presents a novel and efficient way of exploiting side-channel leakage of masked implement...
Lattice-based schemes are among the most promising post-quantum schemes, yet the effect of both para...
In the search for post-quantum secure alternatives to RSA and ECC, lattice-based cryptography appear...