A compact and high-performance hardware architecture for CRYSTALS-Dilithium

C Zhao, N Zhang, H Wang, B Yang, W Zhu… - IACR Transactions on …, 2022 - tches.iacr.org
The lattice-based CRYSTALS-Dilithium scheme is one of the three thirdround digital
signature finalists in the National Institute of Standards and Technology Post-Quantum …

Signature correction attack on dilithium signature scheme

S Islam, K Mus, R Singh, P Schaumont… - 2022 IEEE 7th …, 2022 - ieeexplore.ieee.org
Motivated by the rise of quantum computers, existing public-key cryptosystems are expected
to be replaced by post-quantum schemes in the next decade in billions of devices. To …

Single-trace side-channel attacks on ω-small polynomial sampling: with applications to NTRU, NTRU prime, and crystals-dilithium

E Karabulut, E Alkim, A Aysu - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
This paper proposes a new single-trace side-channel attack on lattice-based post-quantum
protocols. We target the ω-small polynomial sampling of NTRU, NTRU Prime, and …

Horizontal side-channel vulnerabilities of post-quantum key exchange and encapsulation protocols

F Aydin, A Aysu, M Tiwari, A Gerstlauer… - ACM Transactions on …, 2021 - dl.acm.org
Key exchange protocols and key encapsulation mechanisms establish secret keys to
communicate digital information confidentially over public channels. Lattice-based …

Exploiting intermediate value leakage in dilithium: a template-based approach

A Berzati, AC Viera, M Chartouny, S Madec… - IACR Transactions on …, 2023 - hal.science
This paper presents a new profiling side-channel attack on CRYSTALS-Dilithium, the new
NIST primary standard for quantum-safe digital signatures. An open-source implementation …

An efficient non-profiled side-channel attack on the CRYSTALS-Dilithium post-quantum signature

Z Chen, E Karabulut, A Aysu, Y Ma… - 2021 IEEE 39th …, 2021 - ieeexplore.ieee.org
Post-quantum digital signature is a critical primitive of computer security in the era of
quantum hegemony. As a finalist of the post-quantum cryptography standardization process …

Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT based Implementations of Lattice-based Cryptography

T Tosun, E Savas - IEEE Transactions on Information Forensics …, 2024 - ieeexplore.ieee.org
Lattice-based cryptographic schemes such as Crystals-Kyber and Dilithium are post-
quantum algorithms selected to be standardized by NIST as they are considered to be …

Roadmap of post-quantum cryptography standardization: Side-channel attacks and countermeasures

A Shaller, L Zamir, M Nojoumian - Information and Computation, 2023 - Elsevier
Quantum computing utilizes properties of quantum physics to build a fast-computing
machine that can perform quantum computations. This will eventually lead to faster and …

Leaking secrets in homomorphic encryption with side-channel attacks

F Aydin, A Aysu - Journal of Cryptographic Engineering, 2024 - Springer
Homomorphic encryption (HE) allows computing encrypted data in the ciphertext domain
without knowing the encryption key. It is possible, however, to break fully homomorphic …

Reveal: Single-trace side-channel leakage of the seal homomorphic encryption library

F Aydin, E Karabulut, S Potluri… - … Design, Automation & …, 2022 - ieeexplore.ieee.org
This paper demonstrates the first side-channel attack on homomorphic encryption (HE),
which allows computing on encrypted data. We reveal a power-based side-channel leakage …