Post-quantum blockchain security for the Internet of Things: Survey and research directions

H Gharavi, J Granjal, E Monteiro - … Communications Surveys & …, 2024 - ieeexplore.ieee.org
Blockchain is becoming increasingly popular in the business and academic communities
because it can provide security for a wide range of applications. Therefore, researchers …

[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

Masking kyber: First-and higher-order implementations

JW Bos, MO Gourjon, J Renes, T Schneider… - IACR Transactions on …, 2021 - tore.tuhh.de
In the final phase of the post-quantum cryptography standardization effort, the focus has
been extended to include the side-channel resistance of the candidates. While some …

Curse of re-encryption: a generic power/EM analysis on post-quantum KEMs

R Ueno, K Xagawa, Y Tanaka, A Ito… - IACR Transactions on …, 2022 - tches.iacr.org
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM)
based on the Fujisaki–Okamoto (FO) transformation and its variants. The FO transformation …

Magnifying side-channel leakage of lattice-based cryptosystems with chosen ciphertexts: The case study of kyber

Z Xu, O Pemberton, SS Roy, D Oswald… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Lattice-based cryptography, as an active branch of post-quantum cryptography (PQC), has
drawn great attention from side-channel analysis researchers in recent years. Despite the …

Side-channel analysis of lattice-based post-quantum cryptography: Exploiting polynomial multiplication

C Mujdei, L Wouters, A Karmakar, A Beckers… - ACM Transactions on …, 2024 - dl.acm.org
Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic
Transform are fundamental building blocks for lattice-based post-quantum cryptography. In …

A side-channel-resistant implementation of SABER

MV Beirendonck, JP D'anvers, A Karmakar… - ACM Journal on …, 2021 - dl.acm.org
The candidates for the NIST Post-Quantum Cryptography standardization have undergone
extensive studies on efficiency and theoretical security, but research on their side-channel …

Post-quantum hybrid key exchange: a systematic mapping study

AA Giron, R Custódio… - Journal of Cryptographic …, 2023 - Springer
A key exchange protocol (KEX) is a mechanism that allows two parties to secure their
communications using encryption. Since it was apparent that large-scale quantum …

Bitslicing arithmetic/Boolean masking conversions for fun and profit: with application to lattice-based KEMs

O Bronchain, G Cassiers - IACR Transactions on Cryptographic …, 2022 - tches.iacr.org
The performance of higher-order masked implementations of lattice-based based key
encapsulation mechanisms (KEM) is currently limited by the costly conversions between …

Attacking and defending masked polynomial comparison for lattice-based cryptography

S Bhasin, JP D'Anvers, D Heinz… - IACR Transactions on …, 2021 - tches.iacr.org
In this work, we are concerned with the hardening of post-quantum key encapsulation
mechanisms (KEM) against side-channel attacks, with a focus on the comparison operation …