A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Assessment of the Key-Reuse Resilience of NewHope
[chapter]
2019
Lecture Notes in Computer Science
In this paper, we study the security of NewHope when an active adversary accesses a key establishment and is given access to an oracle, called key mismatch oracle, which indicates whether her guess of ...
NewHope is a suite of two efficient Ring-Learning-With-Error based key encapsulation mechanisms (KEMs) that has been proposed to the NIST call for proposals for post-quantum standardization. ...
Fig. 2 . 2 The Attack Model 4 Attack on NewHope with Key Mismatch Oracle
3). ...
doi:10.1007/978-3-030-12612-4_14
fatcat:er47wsrnozeodbulezbbwd5lp4
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs
2020
Transactions on Cryptographic Hardware and Embedded Systems
Our attacks lead to complete key-recovery in a matter of minutes on all the targeted schemes, thus showing the effectiveness of our attack. ...
In this work, we demonstrate generic and practical EM side-channel assisted chosen ciphertext attacks over multiple LWE/LWR-based Public Key Encryption (PKE) and Key Encapsulation Mechanisms (KEM) secure ...
The visit and the work was partially funded by BMW Asia Pte Ltd (Award no. M4062657.B60.500000). ...
doi:10.13154/tches.v2020.i3.307-335
dblp:journals/tches/RaviRCB20
fatcat:vxjrhqhmffcm5a5pdo5tqpk624
Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms
2021
IEEE Access
An early version of this work is available as a technical report on the University of Waterloo's Centre for Applied Cryptographic Research website and was presented at NIST's Second PQC Standardization ...
ACKNOWLEDGMENT This work was funded in part by the Natural Sciences and Engineering Research Council of Canada. ...
This paper extends the work completed in [20] in which the energy of NIST PQC Round 1 candidates were studied. ...
doi:10.1109/access.2021.3077843
fatcat:o62peui5ufaybi4fnevrem5apq
Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions
[article]
2021
arXiv
pre-print
This survey aims to draw greater attention to the importance of physical security, with a focus on secure key generation and storage as well as secure execution. ...
More specifically, the possibility of performing side-channel analysis in the quantum world is discussed and compared to attacks launched in the classic world. ...
As discussed earlier, the side-channel attack consists of two steps. Firstly, data is obtained, which is processed into optimal sub-key candidates. ...
arXiv:2005.04344v2
fatcat:jstlhwebznfadf5g2zdri4sb6i
Quantum Computing: A Taxonomy, Systematic Review and Future Directions
[article]
2021
arXiv
pre-print
This article presents a comprehensive review of quantum computing literature, and taxonomy of quantum computing. ...
Quantum computing is a highly topical and fast-moving field of research with significant ongoing progress in all facets. ...
keys), and side-channel attacks. ...
arXiv:2010.15559v4
fatcat:y6cuttww5fd5jdmvcer352lh4e
Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions
[article]
2020
This survey aims to draw greater attention to the importance of physical security, with a focus on secure key generation and storage as well as secure execution. ...
More specifically, the possibility of performing side-channel analysis in the quantum world is discussed and compared to attacks launched in the classic world. ...
As discussed earlier, the side-channel attack consists of two steps. Firstly, data is obtained, which is processed into optimal sub-key candidates. ...
doi:10.48550/arxiv.2005.04344
fatcat:omcbbz2crfdcjfol43kepmpdjm