A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
From MaRDI portal
Publication:2096530
DOI10.1007/978-3-030-56880-1_13zbMath1504.94144OpenAlexW3037033594MaRDI QIDQ2096530
Qian Guo, Alexander Nilsson, Thomas Johansson
Publication date: 9 November 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56880-1_13
Related Items (8)
SoK: how (not) to design and implement post-quantum cryptography ⋮ One-hot conversion: towards faster table-based A2B conversion ⋮ Fast first-order masked NTTRU ⋮ A message recovery attack on LWE/LWR-based PKE/KEMs using amplitude-modulated EM emanations ⋮ Higher-order masked Saber ⋮ Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates ⋮ Fault-enabled chosen-ciphertext attacks on Kyber ⋮ CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
Uses Software
Cites Work
- HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction
- A modular analysis of the Fujisaki-Okamoto transformation
- Flush, Gauss, and reload -- a cache attack on the BLISS lattice-based signature scheme
- A novel CCA attack using decryption errors against LAC
- Decryption failure attacks on IND-CCA secure lattice-based schemes
- Assessment of the key-reuse resilience of NewHope
- Misuse attacks on post-quantum cryptosystems
- Cryptography made simple
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- A Timing Attack against the Secret Permutation in the McEliece PKC
- Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems
- Secure integration of asymmetric and symmetric encryption schemes
- Advances in Cryptology - CRYPTO 2003
This page was built for publication: A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM