Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures
From MaRDI portal
Publication:6145533
DOI10.1016/J.IC.2023.105112OpenAlexW4387807254MaRDI QIDQ6145533FDOQ6145533
Authors: Ari Shaller, Linir Zamir, Mehrdad Nojoumian
Publication date: 2 February 2024
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ic.2023.105112
post-quantum cryptographyside-channel attacksattacks on PQCPQC standardizationquantum-resistant algorithms
Cites Work
- A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes
- Practical power analysis attacks on software implementations of McEliece
- Title not available (Why is that?)
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Attacking and Defending the McEliece Cryptosystem
- Title not available (Why is that?)
- Title not available (Why is that?)
- On the inherent intractability of certain coding problems (Corresp.)
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices
- Generalized Compact Knapsacks Are Collision Resistant
- Title not available (Why is that?)
- Constructing elliptic curve isogenies in quantum subexponential time
- List Decoding for Binary Goppa Codes
- Horizontal Correlation Analysis on Exponentiation
- CSIDH: an efficient post-quantum commutative group action
- Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
- An Analysis of Goubin’s Refined Power Analysis Attack
- Fault attacks on UOV and Rainbow
- Fuzzy matching template attacks on multivariate cryptography: a case study
- Grafting trees: a fault attack against the SPHINCS framework
- A modular analysis of the Fujisaki-Okamoto transformation
- SPHINCS: practical stateless hash-based signatures
- A key recovery attack on MDPC with CCA security using decoding errors
- On the security of the Winternitz one-time signature scheme
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes
- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations
- Shuffling against side-channel attacks: a comprehensive study with cautionary note
- Fault attack on supersingular isogeny cryptosystems
- QC-MDPC: a timing attack and a CCA2 KEM
- FPGA-based Niederreiter cryptosystem using binary Goppa codes
- Loop-abort faults on supersingular isogeny cryptosystems
- Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures
- Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman
- Fault analysis of the NTRUSign digital signature scheme
- Identification protocols and signature schemes based on supersingular isogeny problems
- A timing attack against the secret permutation in the McEliece PKC
- A Key Recovery Reaction Attack on QC-MDPC
- Differential power analysis of XMSS and SPHINCS
- On the quaternion \(\ell\)-isogeny path problem
- Single-trace side-channel attacks on masked lattice-based encryption
- Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE
- More practical single-trace attacks on the number theoretic transform
- Differential power analysis of a McEliece cryptosystem
- Area-Time Efficient Computation of Niederreiter Encryption on QC-MDPC Codes for Embedded Hardware
- Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices
- BLAKE-512-Based 128-Bit CCA2 Secure Timing Attack Resistant McEliece Cryptoprocessor
This page was built for publication: Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6145533)