Algorithmic security is insufficient: A comprehensive survey on implementation attacks haunting post-quantum security

AC Canto, J Kaur, MM Kermani… - arXiv preprint arXiv …, 2023 - arxiv.org
This survey is on forward-looking, emerging security concerns in post-quantum era, ie, the
implementation attacks for 2022 winners of NIST post-quantum cryptography (PQC) …

Single-trace attacks on keccak

MJ Kannwischer, P Pessl, R Primas - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Since its selection as the winner of the SHA-3 competition, Keccak, with all its variants, has
found a large number of applications. It is, for instance, a common building block in schemes …

[HTML][HTML] Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols

Y Baseri, V Chouhan, A Hafid - Computers & Security, 2024 - Elsevier
The emergence of quantum computing poses a formidable security challenge to network
protocols traditionally safeguarded by classical cryptographic algorithms. This paper …

SCAUL: Power side-channel analysis with unsupervised learning

K Ramezanpour, P Ampadu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Existing power analysis techniques rely on strong adversary models with prior knowledge of
the leakage or training data. We introduce side-channel analysis with unsupervised learning …

A survey on post-quantum public-key signature schemes for secure vehicular communications

KA Shim - IEEE Transactions on Intelligent Transportation …, 2021 - ieeexplore.ieee.org
Basic security requirements such as confidentiality, user authentication and data integrity,
are assured by using public-key cryptography (PKC). In particular, public-key signature …

Modulonet: Neural networks meet modular arithmetic for efficient hardware masking

A Dubey, A Ahmad, MA Pasha… - IACR Transactions on …, 2022 - tches.iacr.org
Intellectual Property (IP) thefts of trained machine learning (ML) models through side-
channel attacks on inference engines are becoming a major threat. Indeed, several recent …

Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks

P Gao, Y Zhang, F Song, T Chen… - Proceedings of the ACM …, 2023 - dl.acm.org
Masking is one of the most effective countermeasures for securely implementing
cryptographic algorithms against power side-channel attacks, the design of which however …

Side-channel attacks on post-quantum signature schemes based on multivariate quadratic equations:-rainbow and uov

A Park, KA Shim, N Koo, DG Han - IACR Transactions on …, 2018 - tches.iacr.org
In this paper, we investigate the security of Rainbow and Unbalanced Oil-and-Vinegar
(UOV) signature schemes based on multivariate quadratic equations, which is one of the …

On the suitability of post-quantum signature schemes for internet of things

KA Shim - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Public-key cryptography (PKC) provides confidentiality, data integrity, and user
authentication. Particularly, nonrepudiation, authentication and integrity of transmitted …

[HTML][HTML] Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions

S Chowdhury, A Covic, RY Acharya, S Dupee… - Journal of Cryptographic …, 2021 - Springer
Over the past decades, quantum technology has seen consistent progress, with notable
recent developments in the field of quantum computers. Traditionally, this trend has been …