Differential Fault Attacks on Deterministic Lattice Signatures
In this paper, we extend the applicability of differential fault attacks to lattice-based cryptography. We show how two deterministic lattice-based signature schemes, Dilithium and qTESLA, are vulnerable to such attacks.
Leon Groot Bruinderink, Peter Pessl
doaj +1 more source
Comparative study of four immortalised human brain capillary endothelial cell lines, hCMEC/D3, hBMED, TY10, and BB19, and optimization of culture conditions, for an in vitro blood-brain barrier model for drug permeability studies [PDF]
BACKGROUND: Reliable human in vitro blood–brain barrier (BBB) models suitable for high-throughput screening are urgently needed in early drug discovery and development for assessing the ability of promising bioactive compounds to overcome the BBB.
Eigenmann, Daniela E. +5 more
core +2 more sources
Correction Fault Attacks on Randomized CRYSTALS-Dilithium
After NIST’s selection of Dilithium as the primary future standard for quantum-secure digital signatures, increased efforts to understand its implementation security properties are required to enable widespread adoption on embedded devices.
Elisabeth Krahmer +3 more
doaj +1 more source
HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures
We present HAETAE (Hyperball bimodAl modulE rejecTion signAture schemE), a new lattice-based signature scheme. Like the NIST-selected Dilithium signature scheme, HAETAE is based on the Fiat-Shamir with Aborts paradigm, but our design choices target an ...
Jung Hee Cheon +9 more
doaj +1 more source
^(13)C, ^1H, and ^2H NMR Observation of Trideuterated Cyclopropylmethyl-Cyclobutyl Carbocation: A Configurationally Stable Species [PDF]
With the increasing power and sophistication of experimental and theoretical methods for assigning chemical structures, it seems almost incredible that the structure of any reasonably stable organic entity with a small number of carbons could remain ...
Brittain, William J. +2 more
core
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks
We present a set of physical profiled attacks against CRYSTALS-Dilithium that accumulate noisy knowledge on secret keys over multiple signatures, finally leading to a full key recovery attack. The methodology is composed of two steps.
Olivier Bronchain +4 more
doaj +1 more source
Privately Generated Key Pairs for Post Quantum Cryptography in a Distributed Network
In the proposed protocol, a trusted entity interacts with the terminal device of each user to verify the legitimacy of the public keys without having access to the private keys that are generated and kept totally secret by the user.
Mahafujul Alam +2 more
doaj +1 more source
High-Speed NTT Accelerator for CRYSTAL-Kyber and CRYSTAL-Dilithium
The efficiency of polynomial multiplication execution majorly impacts the performance of lattice-based post-quantum cryptosystems. In this research, we propose a high-speed hardware architecture to accelerate polynomial multiplication based on the Number
Trong-Hung Nguyen +3 more
doaj +1 more source
A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications
Lattice-Based Cryptography (LBC) schemes, like CRYSTALS-Kyber and CRYSTALS-Dilithium, have been selected to be standardized in the NIST Post-Quantum Cryptography standard.
Zewen Ye +5 more
doaj +1 more source
Identification of a new lithium oxide, Li3O2 [PDF]
Lithium oxide (Li3O2) was prepared by decomposing anhydrous lithium hydroxide at 360 C in 48 hours and between 640 and 730 C in times up to 1.3 hours and pressures of about 0.00001 torr.
Stecura, S.
core +1 more source

