A key-recovery attack against Mitaka in the \(t\)-probing model
From MaRDI portal
Publication:6091134
DOI10.1007/978-3-031-31368-4_8zbMath1527.94060OpenAlexW4367663775MaRDI QIDQ6091134
Publication date: 24 November 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-31368-4_8
Cites Work
- Unnamed Item
- Unnamed Item
- Masking the GLP lattice-based signature scheme at any order
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- LWE with side information: attacks and concrete security estimation
- \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}
- More efficient algorithms for the NTRU key generation using the field norm
- Revisiting the expected cost of solving uSVP and applications to LWE
- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Trapdoors for hard lattices and new cryptographic constructions
- Advances in Cryptology - CRYPTO 2003
- The nearest-colattice algorithm: Time-approximation tradeoff for approx-CVP