Masked accelerators and instruction set extensions for post-quantum cryptography
T Fritzmann, M Van Beirendonck… - IACR …, 2022 - philosophymindscience.org
Side-channel attacks can break mathematically secure cryptographic systems leading to a
major concern in applied cryptography. While the cryptanalysis and security evaluation of …
major concern in applied cryptography. While the cryptanalysis and security evaluation of …
First-order masked Kyber on ARM Cortex-M4
In this work, we present a fast and first-order secure Kyber implementation optimized for
ARM Cortex-M4. Most notably, to our knowledge this is the first liberally-licensed open …
ARM Cortex-M4. Most notably, to our knowledge this is the first liberally-licensed open …
Revisiting higher-order masked comparison for lattice-based cryptography: Algorithms and bit-sliced implementations
JP D'Anvers, M Van Beirendonck… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Masked comparison is one of the most expensive operations in side-channel secure
implementations of lattice-based post-quantum cryptography, especially for higher masking …
implementations of lattice-based post-quantum cryptography, especially for higher masking …
A masked pure-hardware implementation of kyber cryptographic algorithm
Quantum computing-specifically Shor's algorithm [1]-presents an existential threat to some
standard cryptographic algorithms. In preparation, post-quantum cryptography (PQC) …
standard cryptographic algorithms. In preparation, post-quantum cryptography (PQC) …
Formal verification of arithmetic masking in hardware and software
Masking is a popular countermeasure to protect cryptographic implementations against
physical attacks like differential power analysis. So far, research focused on Boolean …
physical attacks like differential power analysis. So far, research focused on Boolean …
High-order table-based conversion algorithms and masking lattice-based encryption
Masking is the main countermeasure against side-channel attacks on embedded devices.
For cryptographic algorithms that combine Boolean and arithmetic masking, one must …
For cryptographic algorithms that combine Boolean and arithmetic masking, one must …
Power-based side channel attack analysis on PQC algorithms
Power-based side channel attacks have been successfully conducted against proven
cryptographic algorithms including standardized algorithms such as AES and RSA. These …
cryptographic algorithms including standardized algorithms such as AES and RSA. These …
One-hot conversion: Towards faster table-based A2B conversion
JP D'Anvers - Annual International Conference on the Theory and …, 2023 - Springer
Arithmetic to Boolean masking (A2B) conversion is a crucial technique in the masking of
lattice-based post-quantum cryptography. It is also a crucial part of building a masked …
lattice-based post-quantum cryptography. It is also a crucial part of building a masked …
A Low-Latency High-Order Arithmetic to Boolean Masking Conversion
Masking, an effective countermeasure against side-channel attacks, is commonly applied in
modern cryptographic implementations. Considering cryptographic algorithms that utilize …
modern cryptographic implementations. Considering cryptographic algorithms that utilize …
Side-Channel Analysis of Arithmetic Encodings for Post-Quantum Cryptography: Cautionary Notes with Application to Kyber
D Pay, FX Standaert - International Conference on Cryptology in Africa, 2024 - Springer
The unprotected implementations of Kyber and Dilithium have recently been shown to offer
a variety of side-channel attack paths. These attacks have in turn triggered the investigation …
a variety of side-channel attack paths. These attacks have in turn triggered the investigation …