Masked accelerators and instruction set extensions for post-quantum cryptography

T Fritzmann, M Van Beirendonck… - IACR …, 2022 - philosophymindscience.org
Side-channel attacks can break mathematically secure cryptographic systems leading to a
major concern in applied cryptography. While the cryptanalysis and security evaluation of …

First-order masked Kyber on ARM Cortex-M4

D Heinz, MJ Kannwischer, G Land… - Cryptology ePrint …, 2022 - eprint.iacr.org
In this work, we present a fast and first-order secure Kyber implementation optimized for
ARM Cortex-M4. Most notably, to our knowledge this is the first liberally-licensed open …

Revisiting higher-order masked comparison for lattice-based cryptography: Algorithms and bit-sliced implementations

JP D'Anvers, M Van Beirendonck… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Masked comparison is one of the most expensive operations in side-channel secure
implementations of lattice-based post-quantum cryptography, especially for higher masking …

A masked pure-hardware implementation of kyber cryptographic algorithm

T Kamucheka, A Nelson, D Andrews… - … Conference on Field …, 2022 - ieeexplore.ieee.org
Quantum computing-specifically Shor's algorithm [1]-presents an existential threat to some
standard cryptographic algorithms. In preparation, post-quantum cryptography (PQC) …

Formal verification of arithmetic masking in hardware and software

B Gigerl, R Primas, S Mangard - International Conference on Applied …, 2023 - Springer
Masking is a popular countermeasure to protect cryptographic implementations against
physical attacks like differential power analysis. So far, research focused on Boolean …

High-order table-based conversion algorithms and masking lattice-based encryption

JS Coron, F Gérard, S Montoya… - IACR Transactions on …, 2022 - orbilu.uni.lu
Masking is the main countermeasure against side-channel attacks on embedded devices.
For cryptographic algorithms that combine Boolean and arithmetic masking, one must …

Power-based side channel attack analysis on PQC algorithms

T Kamucheka, M Fahr, T Teague, A Nelson… - Cryptology ePrint …, 2021 - eprint.iacr.org
Power-based side channel attacks have been successfully conducted against proven
cryptographic algorithms including standardized algorithms such as AES and RSA. These …

One-hot conversion: Towards faster table-based A2B conversion

JP D'Anvers - Annual International Conference on the Theory and …, 2023 - Springer
Arithmetic to Boolean masking (A2B) conversion is a crucial technique in the masking of
lattice-based post-quantum cryptography. It is also a crucial part of building a masked …

A Low-Latency High-Order Arithmetic to Boolean Masking Conversion

J Liu, C Zhao, S Peng, B Yang, H Zhao… - IACR Transactions on …, 2024 - tches.iacr.org
Masking, an effective countermeasure against side-channel attacks, is commonly applied in
modern cryptographic implementations. Considering cryptographic algorithms that utilize …

Side-Channel Analysis of Arithmetic Encodings for Post-Quantum Cryptography: Cautionary Notes with Application to Kyber

D Pay, FX Standaert - International Conference on Cryptology in Africa, 2024 - Springer
The unprotected implementations of Kyber and Dilithium have recently been shown to offer
a variety of side-channel attack paths. These attacks have in turn triggered the investigation …