Flush, Gauss, and reload -- a cache attack on the BLISS lattice-based signature scheme
From MaRDI portal
Publication:1695977
DOI10.1007/978-3-662-53140-2_16zbMath1411.94065OpenAlexW2412886904MaRDI QIDQ1695977
Yuval Yarom, Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange
Publication date: 14 February 2018
Full work available at URL: https://research.tue.nl/nl/publications/flush-gauss-and-reload--a-cache-attack-on-the-bliss-latticebased-signature-scheme(b0ca00e3-595d-4d22-b001-02695b1ad49b).html
Related Items (17)
SoK: how (not) to design and implement post-quantum cryptography ⋮ Isochronous Gaussian Sampling: From Inception to Implementation ⋮ Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures ⋮ Integer LWE with non-subgaussian error and related attacks ⋮ Improved power analysis attacks on Falcon ⋮ A lightweight identification protocol based on lattices ⋮ Verifiable decryption in the head ⋮ Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding ⋮ Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures ⋮ Polar sampler: a novel Bernoulli sampler using polar codes with application to integer Gaussian sampling ⋮ NTRU prime: reducing attack surface at low cost ⋮ Masking the GLP lattice-based signature scheme at any order ⋮ One bit is all it takes: a devastating timing attack on BLISS's non-constant time sign flips ⋮ Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices ⋮ On the rejection rate of exact sampling algorithm for discrete Gaussian distributions over the integers ⋮ LWE with side information: attacks and concrete security estimation ⋮ A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
This page was built for publication: Flush, Gauss, and reload -- a cache attack on the BLISS lattice-based signature scheme