A compact and high-performance hardware architecture for CRYSTALS-Dilithium
The lattice-based CRYSTALS-Dilithium scheme is one of the three thirdround digital
signature finalists in the National Institute of Standards and Technology Post-Quantum …
signature finalists in the National Institute of Standards and Technology Post-Quantum …
Signature correction attack on dilithium signature scheme
Motivated by the rise of quantum computers, existing public-key cryptosystems are expected
to be replaced by post-quantum schemes in the next decade in billions of devices. To …
to be replaced by post-quantum schemes in the next decade in billions of devices. To …
Single-trace side-channel attacks on ω-small polynomial sampling: with applications to NTRU, NTRU prime, and crystals-dilithium
This paper proposes a new single-trace side-channel attack on lattice-based post-quantum
protocols. We target the ω-small polynomial sampling of NTRU, NTRU Prime, and …
protocols. We target the ω-small polynomial sampling of NTRU, NTRU Prime, and …
Horizontal side-channel vulnerabilities of post-quantum key exchange and encapsulation protocols
Key exchange protocols and key encapsulation mechanisms establish secret keys to
communicate digital information confidentially over public channels. Lattice-based …
communicate digital information confidentially over public channels. Lattice-based …
Exploiting intermediate value leakage in dilithium: a template-based approach
This paper presents a new profiling side-channel attack on CRYSTALS-Dilithium, the new
NIST primary standard for quantum-safe digital signatures. An open-source implementation …
NIST primary standard for quantum-safe digital signatures. An open-source implementation …
An efficient non-profiled side-channel attack on the CRYSTALS-Dilithium post-quantum signature
Post-quantum digital signature is a critical primitive of computer security in the era of
quantum hegemony. As a finalist of the post-quantum cryptography standardization process …
quantum hegemony. As a finalist of the post-quantum cryptography standardization process …
Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT based Implementations of Lattice-based Cryptography
Lattice-based cryptographic schemes such as Crystals-Kyber and Dilithium are post-
quantum algorithms selected to be standardized by NIST as they are considered to be …
quantum algorithms selected to be standardized by NIST as they are considered to be …
Roadmap of post-quantum cryptography standardization: Side-channel attacks and countermeasures
A Shaller, L Zamir, M Nojoumian - Information and Computation, 2023 - Elsevier
Quantum computing utilizes properties of quantum physics to build a fast-computing
machine that can perform quantum computations. This will eventually lead to faster and …
machine that can perform quantum computations. This will eventually lead to faster and …
Leaking secrets in homomorphic encryption with side-channel attacks
Homomorphic encryption (HE) allows computing encrypted data in the ciphertext domain
without knowing the encryption key. It is possible, however, to break fully homomorphic …
without knowing the encryption key. It is possible, however, to break fully homomorphic …
Reveal: Single-trace side-channel leakage of the seal homomorphic encryption library
This paper demonstrates the first side-channel attack on homomorphic encryption (HE),
which allows computing on encrypted data. We reveal a power-based side-channel leakage …
which allows computing on encrypted data. We reveal a power-based side-channel leakage …