Lattice-based cryptography has been proposed as a postquantum public-key cryptosystem. In this paper, we present a masked ring-LWE decryption implementation resistant to first-order side-channel attacks. Our solution has the peculiarity that the entire computation is performed in the masked domain. This is achieved thanks to a new, bespoke masked decoder implementation. The output of the ring-LWE decryption are Boolean shares suitable for derivation of a symmetric key. We have implemented a hardware architecture of the masked ring-LWE processor on a Virtex-II FPGA, and have performed side channel analysis to confirm the soundness of our approach. The area of the protected architecture is around $2000$ LUTs, a $20\%$ increase with respect to...
A new approach to the security analysis of hardware-oriented masked ciphers against second-order sid...
This paper presents a novel and efficient way of exploiting side-channel leakage of masked implement...
To defend against the rising threat of quantum computers, NIST initiated their Post-Quantum Cryptogr...
© International Association for Cryptologic Research 2015. Lattice-based cryptography has been propo...
Abstract. Lattice-based cryptography has been proposed as a postquan-tum public-key cryptosystem. In...
© 2016, Springer-Verlag Berlin Heidelberg. In this paper, we propose a masking scheme to protect rin...
During the last years public-key encryption schemes based on the hardness of ring-LWE have gained si...
The candidates for the NIST Post-Quantum Cryptography standardization have undergone extensive studi...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Instantiations of the McEliece cryptosystem which are considered computationally secure even in a po...
Although lattice-based cryptography has proven to be a particularly efficient approach to post-quant...
© Springer International Publishing Switzerland 2016. In this paper, we present a new masking scheme...
Accepted paper for the ACM- Journal on Emerging Technologies in Computing Systems, 2020 [Abstract] ...
Streamlined NTRU Prime is a lattice-based Key Encapsulation Mechanism (KEM) that is, together with X...
A new approach to the security analysis of hardware-oriented masked ciphers against second-order sid...
This paper presents a novel and efficient way of exploiting side-channel leakage of masked implement...
To defend against the rising threat of quantum computers, NIST initiated their Post-Quantum Cryptogr...
© International Association for Cryptologic Research 2015. Lattice-based cryptography has been propo...
Abstract. Lattice-based cryptography has been proposed as a postquan-tum public-key cryptosystem. In...
© 2016, Springer-Verlag Berlin Heidelberg. In this paper, we propose a masking scheme to protect rin...
During the last years public-key encryption schemes based on the hardness of ring-LWE have gained si...
The candidates for the NIST Post-Quantum Cryptography standardization have undergone extensive studi...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Instantiations of the McEliece cryptosystem which are considered computationally secure even in a po...
Although lattice-based cryptography has proven to be a particularly efficient approach to post-quant...
© Springer International Publishing Switzerland 2016. In this paper, we present a new masking scheme...
Accepted paper for the ACM- Journal on Emerging Technologies in Computing Systems, 2020 [Abstract] ...
Streamlined NTRU Prime is a lattice-based Key Encapsulation Mechanism (KEM) that is, together with X...
A new approach to the security analysis of hardware-oriented masked ciphers against second-order sid...
This paper presents a novel and efficient way of exploiting side-channel leakage of masked implement...
To defend against the rising threat of quantum computers, NIST initiated their Post-Quantum Cryptogr...