Filters








6 Hits in 3.4 sec

Assessment of the Key-Reuse Resilience of NewHope [chapter]

Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi
2019 Lecture Notes in Computer Science  
In this paper, we study the security of NewHope when an active adversary accesses a key establishment and is given access to an oracle, called key mismatch oracle, which indicates whether her guess of  ...  NewHope is a suite of two efficient Ring-Learning-With-Error based key encapsulation mechanisms (KEMs) that has been proposed to the NIST call for proposals for post-quantum standardization.  ...  Fig. 2 . 2 The Attack Model 4 Attack on NewHope with Key Mismatch Oracle 3).  ... 
doi:10.1007/978-3-030-12612-4_14 fatcat:er47wsrnozeodbulezbbwd5lp4

Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs

Prasanna Ravi, Sujoy Sinha Roy, Anupam Chattopadhyay, Shivam Bhasin
2020 Transactions on Cryptographic Hardware and Embedded Systems  
Our attacks lead to complete key-recovery in a matter of minutes on all the targeted schemes, thus showing the effectiveness of our attack.  ...  In this work, we demonstrate generic and practical EM side-channel assisted chosen ciphertext attacks over multiple LWE/LWR-based Public Key Encryption (PKE) and Key Encapsulation Mechanisms (KEM) secure  ...  The visit and the work was partially funded by BMW Asia Pte Ltd (Award no. M4062657.B60.500000).  ... 
doi:10.13154/tches.v2020.i3.307-335 dblp:journals/tches/RaviRCB20 fatcat:vxjrhqhmffcm5a5pdo5tqpk624

Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms

Crystal Andrea Roma, Chi-En Amy Tai, M. Anwar Hasan
2021 IEEE Access  
An early version of this work is available as a technical report on the University of Waterloo's Centre for Applied Cryptographic Research website and was presented at NIST's Second PQC Standardization  ...  ACKNOWLEDGMENT This work was funded in part by the Natural Sciences and Engineering Research Council of Canada.  ...  This paper extends the work completed in [20] in which the energy of NIST PQC Round 1 candidates were studied.  ... 
doi:10.1109/access.2021.3077843 fatcat:o62peui5ufaybi4fnevrem5apq

Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions [article]

Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji, Domenic Forte
2021 arXiv   pre-print
This survey aims to draw greater attention to the importance of physical security, with a focus on secure key generation and storage as well as secure execution.  ...  More specifically, the possibility of performing side-channel analysis in the quantum world is discussed and compared to attacks launched in the classic world.  ...  As discussed earlier, the side-channel attack consists of two steps. Firstly, data is obtained, which is processed into optimal sub-key candidates.  ... 
arXiv:2005.04344v2 fatcat:jstlhwebznfadf5g2zdri4sb6i

Quantum Computing: A Taxonomy, Systematic Review and Future Directions [article]

Sukhpal Singh Gill, Adarsh Kumar, Harvinder Singh, Manmeet Singh, Kamalpreet Kaur, Muhammad Usman, Rajkumar Buyya
2021 arXiv   pre-print
This article presents a comprehensive review of quantum computing literature, and taxonomy of quantum computing.  ...  Quantum computing is a highly topical and fast-moving field of research with significant ongoing progress in all facets.  ...  keys), and side-channel attacks.  ... 
arXiv:2010.15559v4 fatcat:y6cuttww5fd5jdmvcer352lh4e

Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions [article]

Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji, Domenic Forte
2020
This survey aims to draw greater attention to the importance of physical security, with a focus on secure key generation and storage as well as secure execution.  ...  More specifically, the possibility of performing side-channel analysis in the quantum world is discussed and compared to attacks launched in the classic world.  ...  As discussed earlier, the side-channel attack consists of two steps. Firstly, data is obtained, which is processed into optimal sub-key candidates.  ... 
doi:10.48550/arxiv.2005.04344 fatcat:omcbbz2crfdcjfol43kepmpdjm