Masking the GLP lattice-based signature scheme at any order
From MaRDI portal
Publication:6182002
DOI10.1007/s00145-023-09485-zOpenAlexW2949090085MaRDI QIDQ6182002
Gilles Barthe, Pierre-Alain Fouque, Benjamin Grégoire, Sonia Belaïd, Mehdi Tibouchi, Mélissa Rossi, Thomas Espitau
Publication date: 23 January 2024
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-023-09485-z
Cryptography (94A60) Channel models (including quantum) in information and communication theory (94A40) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Unnamed Item
- Unnamed Item
- Masking the GLP lattice-based signature scheme at any order
- A masked ring-LWE implementation
- Flush, Gauss, and reload -- a cache attack on the BLISS lattice-based signature scheme
- Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures
- \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}
- Efficiently masking binomial sampling at arbitrary orders for lattice-based crypto
- Masking Dilithium. Efficient implementation and side-channel evaluation
- A lattice-based provably secure multisignature scheme in quantum random oracle model
- Additively Homomorphic Ring-LWE Masking
- Lattice Signatures and Bimodal Gaussians
- Lattice Signatures without Trapdoors
- Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity
- Verified Proofs of Higher-Order Masking
- Trapdoors for hard lattices and new cryptographic constructions
- Provably Secure Higher-Order Masking of AES
- Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
- High-Order Conversion from Boolean to Arithmetic Masking
- Secure Conversion between Boolean and Arithmetic Masking of Any Order
- Enhanced Lattice-Based Signatures on Reconfigurable Hardware
- An Improved Compression Technique for Signatures Based on Learning with Errors
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- Higher Order Masking of Look-Up Tables
- Advances in Cryptology - CRYPTO 2003
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices
- MuSig-L: lattice-based multi-signature with single-round online phase
This page was built for publication: Masking the GLP lattice-based signature scheme at any order