Algorithmic security is insufficient: A comprehensive survey on implementation attacks haunting post-quantum security
This survey is on forward-looking, emerging security concerns in post-quantum era, ie, the
implementation attacks for 2022 winners of NIST post-quantum cryptography (PQC) …
implementation attacks for 2022 winners of NIST post-quantum cryptography (PQC) …
Curse of re-encryption: a generic power/EM analysis on post-quantum KEMs
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM)
based on the Fujisaki–Okamoto (FO) transformation and its variants. The FO transformation …
based on the Fujisaki–Okamoto (FO) transformation and its variants. The FO transformation …
SoK: How (not) to design and implement post-quantum cryptography
Post-quantum cryptography has known a Cambrian explosion in the last decade. What
started as a very theoretical and mathematical area has now evolved into a sprawling …
started as a very theoretical and mathematical area has now evolved into a sprawling …
Carry-less to bike faster
Recent advances in the development of quantum computers manifest the urge to initiate the
transition from classic public key cryptography to quantum secure algorithms. Therefore …
transition from classic public key cryptography to quantum secure algorithms. Therefore …
Efficiently masking polynomial inversion at arbitrary order
Physical side-channel analysis poses a huge threat to post-quantum cryptographic schemes
implemented on embedded devices. Still, secure implementations are missing for many …
implemented on embedded devices. Still, secure implementations are missing for many …
Roadmap of post-quantum cryptography standardization: Side-channel attacks and countermeasures
A Shaller, L Zamir, M Nojoumian - Information and Computation, 2023 - Elsevier
Quantum computing utilizes properties of quantum physics to build a fast-computing
machine that can perform quantum computations. This will eventually lead to faster and …
machine that can perform quantum computations. This will eventually lead to faster and …
Information-set decoding with hints
This paper studies how to incorporate small information leakages (called “hints”) into
information-set decoding (ISD) algorithms. In particular, the influence of these hints on …
information-set decoding (ISD) algorithms. In particular, the influence of these hints on …
Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions
Over the past decades, quantum technology has seen consistent progress, with notable
recent developments in the field of quantum computers. Traditionally, this trend has been …
recent developments in the field of quantum computers. Traditionally, this trend has been …
[HTML][HTML] Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures
Although quantum mechanics guarantees the security of the quantum key distribution
system, it is crucial to examine whether the implementation flaws can lead to the disclosure …
system, it is crucial to examine whether the implementation flaws can lead to the disclosure …
Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions
Over the past decades, quantum technology has seen consistent progress, with notable
recent developments in the field of quantum computers. Traditionally, this trend has been …
recent developments in the field of quantum computers. Traditionally, this trend has been …