Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures
From MaRDI portal
Publication:6145533
Cites work
- scientific article; zbMATH DE number 3989251 (Why is no real title available?)
- scientific article; zbMATH DE number 4070803 (Why is no real title available?)
- scientific article; zbMATH DE number 1186948 (Why is no real title available?)
- scientific article; zbMATH DE number 1559544 (Why is no real title available?)
- A Key Recovery Reaction Attack on QC-MDPC
- A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes
- A key recovery attack on MDPC with CCA security using decoding errors
- A modular analysis of the Fujisaki-Okamoto transformation
- A timing attack against the secret permutation in the McEliece PKC
- An Analysis of Goubin’s Refined Power Analysis Attack
- Area-Time Efficient Computation of Niederreiter Encryption on QC-MDPC Codes for Embedded Hardware
- Attacking and Defending the McEliece Cryptosystem
- BLAKE-512-Based 128-Bit CCA2 Secure Timing Attack Resistant McEliece Cryptoprocessor
- CSIDH: an efficient post-quantum commutative group action
- Constructing elliptic curve isogenies in quantum subexponential time
- Differential power analysis of XMSS and SPHINCS
- Differential power analysis of a McEliece cryptosystem
- FPGA-based Niederreiter cryptosystem using binary Goppa codes
- Fault analysis of the NTRUSign digital signature scheme
- Fault attack on supersingular isogeny cryptosystems
- Fault attacks on UOV and Rainbow
- Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices
- Fuzzy matching template attacks on multivariate cryptography: a case study
- Generalized Compact Knapsacks Are Collision Resistant
- Grafting trees: a fault attack against the SPHINCS framework
- Horizontal Correlation Analysis on Exponentiation
- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations
- Identification protocols and signature schemes based on supersingular isogeny problems
- List Decoding for Binary Goppa Codes
- Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures
- Loop-abort faults on supersingular isogeny cryptosystems
- More practical single-trace attacks on the number theoretic transform
- On the inherent intractability of certain coding problems (Corresp.)
- On the quaternion \(\ell\)-isogeny path problem
- On the security of the Winternitz one-time signature scheme
- Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Practical power analysis attacks on software implementations of McEliece
- QC-MDPC: a timing attack and a CCA2 KEM
- SPHINCS: practical stateless hash-based signatures
- Shuffling against side-channel attacks: a comprehensive study with cautionary note
- Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE
- Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman
- Single-trace side-channel attacks on masked lattice-based encryption
- Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes
This page was built for publication: Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6145533)