Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM [PDF]
This paper proposes a new single-trace side-channel attack on lattice-based post-quantum protocols. We target the ω-small polynomial sampling of NTRU, NTRU Prime, and CRYSTALS-DILITHIUM algorithm implementations (which are NIST Round-3 finalists and ...
Aydin Aysu, Emre Karabulut, Erdem Alkim
core
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles – A case study of Kyber [PDF]
Side-channel resilience is a crucial feature when assessing whether a postquantum cryptographic proposal is sufficiently mature to be deployed. In this paper, we propose a generic and efficient adaptive approach to improve the sample complexity (i.e ...
Chi Cheng +4 more
core +2 more sources
Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication [PDF]
The threat of a cryptographically relevant quantum computer contributes to an increasing interest in the field of post-quantum cryptography (PQC). Compared to existing research efforts regarding the integration of PQC into the Transport Layer Security ...
D Micciancio +9 more
core +1 more source
Quantifying risks in cryptographic selection processes [PDF]
There appears to be a widespread belief that some processes of selecting cryptosystems are less risky than other processes. As a case study of quantifying the difference in risks, this paper compares the currently-known-failure rates of three large ...
Daniel J. Bernstein
core
Quantum Key Search for Ternary LWE [PDF]
Ternary LWE, i.e., LWE with coefficients of the secret and the error vectors taken from $\{-1, 0, 1\}$, is a popular choice among NTRU-type cryptosystems and some signatures schemes like BLISS and GLP.
Alexander May +2 more
core
NIST Post-Quantum Cryptography- A Hardware Evaluation Study [PDF]
Experts forecast that quantum computers can break classical cryptographic algorithms. Scientists are developing post quantum cryptographic (PQC) algorithms, that are invulnerable to quantum computer attacks.
Deepraj Soni +3 more
core
Estimate All the {LWE, NTRU} Schemes! [PDF]
We consider all LWE- and NTRU-based encryption, key encapsulation, and digital signature schemes proposed for standardisation as part of the Post-Quantum Cryptography process run by the US National Institute of Standards and Technology (NIST).
Albrecht, Martin R. +7 more
core +4 more sources
Efficient isochronous fixed-weight sampling with applications to NTRU [PDF]
We present a solution to the open problem of designing a linear-time, unbiased and timing attack-resistant shuffling algorithm for fixed-weight sampling.
Décio Luiz Gazzoni Filho +2 more
core +4 more sources
NTRU-LPR IND-CPA: A New Ideal Lattices-based Scheme [PDF]
In this paper, we propose NTRU-LPR IND-CPA, a new secure scheme based on the decisional variant of Bounded Distance Decoding problem over rings (DR-BDD). This scheme is IND-CPA secure and has two KEM variants IND-CCA2 secure in the random oracle model.
Bernard Ousmane Sané +3 more
core
Criptografía postcuántica [PDF]
[ES] En esta memoria se realiza un estudio donde nos adentraremos brevemente en el mundo de la Criptografía Postcuántica para estudiar algunos de los avances producidos por el NIST sobre la búsqueda de nuevos sistemas criptográficos que puedan resistir ...
Miguel Salgado, Alba
core

