Algorithmic security is insufficient: A comprehensive survey on implementation attacks haunting post-quantum security
This survey is on forward-looking, emerging security concerns in post-quantum era, ie, the
implementation attacks for 2022 winners of NIST post-quantum cryptography (PQC) …
implementation attacks for 2022 winners of NIST post-quantum cryptography (PQC) …
Single-trace attacks on keccak
Since its selection as the winner of the SHA-3 competition, Keccak, with all its variants, has
found a large number of applications. It is, for instance, a common building block in schemes …
found a large number of applications. It is, for instance, a common building block in schemes …
[HTML][HTML] Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols
The emergence of quantum computing poses a formidable security challenge to network
protocols traditionally safeguarded by classical cryptographic algorithms. This paper …
protocols traditionally safeguarded by classical cryptographic algorithms. This paper …
SCAUL: Power side-channel analysis with unsupervised learning
K Ramezanpour, P Ampadu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Existing power analysis techniques rely on strong adversary models with prior knowledge of
the leakage or training data. We introduce side-channel analysis with unsupervised learning …
the leakage or training data. We introduce side-channel analysis with unsupervised learning …
A survey on post-quantum public-key signature schemes for secure vehicular communications
KA Shim - IEEE Transactions on Intelligent Transportation …, 2021 - ieeexplore.ieee.org
Basic security requirements such as confidentiality, user authentication and data integrity,
are assured by using public-key cryptography (PKC). In particular, public-key signature …
are assured by using public-key cryptography (PKC). In particular, public-key signature …
Modulonet: Neural networks meet modular arithmetic for efficient hardware masking
Intellectual Property (IP) thefts of trained machine learning (ML) models through side-
channel attacks on inference engines are becoming a major threat. Indeed, several recent …
channel attacks on inference engines are becoming a major threat. Indeed, several recent …
Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks
Masking is one of the most effective countermeasures for securely implementing
cryptographic algorithms against power side-channel attacks, the design of which however …
cryptographic algorithms against power side-channel attacks, the design of which however …
Side-channel attacks on post-quantum signature schemes based on multivariate quadratic equations:-rainbow and uov
A Park, KA Shim, N Koo, DG Han - IACR Transactions on …, 2018 - tches.iacr.org
In this paper, we investigate the security of Rainbow and Unbalanced Oil-and-Vinegar
(UOV) signature schemes based on multivariate quadratic equations, which is one of the …
(UOV) signature schemes based on multivariate quadratic equations, which is one of the …
On the suitability of post-quantum signature schemes for internet of things
KA Shim - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Public-key cryptography (PKC) provides confidentiality, data integrity, and user
authentication. Particularly, nonrepudiation, authentication and integrity of transmitted …
authentication. Particularly, nonrepudiation, authentication and integrity of transmitted …
[HTML][HTML] Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions
Over the past decades, quantum technology has seen consistent progress, with notable
recent developments in the field of quantum computers. Traditionally, this trend has been …
recent developments in the field of quantum computers. Traditionally, this trend has been …