Algorithmic security is insufficient: A comprehensive survey on implementation attacks haunting post-quantum security

AC Canto, J Kaur, MM Kermani… - arXiv preprint arXiv …, 2023 - arxiv.org
This survey is on forward-looking, emerging security concerns in post-quantum era, ie, the
implementation attacks for 2022 winners of NIST post-quantum cryptography (PQC) …

Curse of re-encryption: a generic power/EM analysis on post-quantum KEMs

R Ueno, K Xagawa, Y Tanaka, A Ito… - IACR Transactions on …, 2022 - tches.iacr.org
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM)
based on the Fujisaki–Okamoto (FO) transformation and its variants. The FO transformation …

SoK: How (not) to design and implement post-quantum cryptography

J Howe, T Prest, D Apon - Cryptographers' Track at the RSA Conference, 2021 - Springer
Post-quantum cryptography has known a Cambrian explosion in the last decade. What
started as a very theoretical and mathematical area has now evolved into a sprawling …

Carry-less to bike faster

MS Chen, T Güneysu, M Krausz, JP Thoma - International Conference on …, 2022 - Springer
Recent advances in the development of quantum computers manifest the urge to initiate the
transition from classic public key cryptography to quantum secure algorithms. Therefore …

Efficiently masking polynomial inversion at arbitrary order

M Krausz, G Land, J Richter-Brockmann… - … Conference on Post …, 2022 - Springer
Physical side-channel analysis poses a huge threat to post-quantum cryptographic schemes
implemented on embedded devices. Still, secure implementations are missing for many …

Roadmap of post-quantum cryptography standardization: Side-channel attacks and countermeasures

A Shaller, L Zamir, M Nojoumian - Information and Computation, 2023 - Elsevier
Quantum computing utilizes properties of quantum physics to build a fast-computing
machine that can perform quantum computations. This will eventually lead to faster and …

Information-set decoding with hints

AL Horlemann, S Puchinger, J Renner… - Code-Based …, 2021 - Springer
This paper studies how to incorporate small information leakages (called “hints”) into
information-set decoding (ISD) algorithms. In particular, the influence of these hints on …

Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions

S Chowdhury, A Covic, RY Acharya, S Dupee… - Journal of Cryptographic …, 2021 - Springer
Over the past decades, quantum technology has seen consistent progress, with notable
recent developments in the field of quantum computers. Traditionally, this trend has been …

[HTML][HTML] Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures

D Park, GS Kim, D Heo, S Kim, HS Kim, S Hong - ICT Express, 2021 - Elsevier
Although quantum mechanics guarantees the security of the quantum key distribution
system, it is crucial to examine whether the implementation flaws can lead to the disclosure …

Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions

S Chowdhury, A Covic, RY Acharya, S Dupee… - arXiv preprint arXiv …, 2020 - arxiv.org
Over the past decades, quantum technology has seen consistent progress, with notable
recent developments in the field of quantum computers. Traditionally, this trend has been …