Breaking a fifth-order masked implementation of crystals-kyber by copy-paste

E Dubrova, K Ngo, J Gärtner, R Wang - … of the 10th ACM Asia public-key …, 2023 - dl.acm.org
CRYSTALS-Kyber has been selected by the NIST as a public-key encryption and key
encapsulation mechanism to be standardized. It is also included in the NSA's suite of …

Secret key recovery attack on masked and shuffled implementations of crystals-kyber and saber

L Backlund, K Ngo, J Gärtner, E Dubrova - International Conference on …, 2023 - Springer
Shuffling is a well-known countermeasure against side-channel attacks. It typically uses the
Fisher-Yates (FY) algorithm to generate a random permutation which is then utilized as the …

Exploiting the central reduction in lattice-based cryptography

T Tosun, A Moradi, E Savas - IEEE Access, 2024 - ieeexplore.ieee.org
This paper questions the side-channel security of central reduction technique, which is
widely adapted in efficient implementations of Lattice-Based Cryptography (LBC). We show …

Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography

A Aikata, A Basso, G Cassiers, AC Mert… - IACR Transactions on …, 2023 - er.ceres.rub.de
Lattice-based cryptography has laid the foundation of various modern-day cryptosystems
that cater to several applications, including post-quantum cryptography. For structured lattice …

Carry your fault: a fault propagation attack on side-channel protected LWE-based KEM

S Kundu, S Chowdhury, S Saha, A Karmakar… - arxiv preprint arxiv …, 2024 - arxiv.org
Post-quantum cryptographic (PQC) algorithms, especially those based on the learning with
errors (LWE) problem, have been subjected to several physical attacks in the recent past …

A 334 μW 0.158 mm2 ASIC for Post-Quantum Key-Encapsulation Mechanism Saber With Low-Latency Striding Toom–Cook Multiplication

A Ghosh, JMB Mera, A Karmakar, D Das… - IEEE Journal of Solid …, 2023 - ieeexplore.ieee.org
Lattice-based cryptography is a novel approach to public key cryptography (PKC), of which
the mathematical investigation (so far) resists attacks from quantum computers. By choosing …

A practical key-recovery attack on LWE-based key-encapsulation mechanism schemes using Rowhammer

P Mondal, S Kundu, S Bhattacharya… - … Conference on Applied …, 2024 - Springer
Physical attacks are serious threats to cryptosystems deployed in the real world. In this work,
we propose a microarchitectural end-to-end attack methodology on generic lattice-based …

Side-channel attacks on lattice-based KEMs are not prevented by higher-order masking

K Ngo, R Wang, E Dubrova, N Paulsrud - Cryptology ePrint Archive, 2022 - eprint.iacr.org
In this paper, we present the first side-channel attack on a higher-order masked
implementation of an IND-CCA secure lattice-based key encapsulation mechanism (KEM) …

Efficiently masking polynomial inversion at arbitrary order

M Krausz, G Land, J Richter-Brockmann… - … Conference on Post …, 2022 - Springer
Physical side-channel analysis poses a huge threat to post-quantum cryptographic schemes
implemented on embedded devices. Still, secure implementations are missing for many …

A message recovery attack on LWE/LWR-based PKE/KEMs using amplitude-modulated EM emanations

R Wang, K Ngo, E Dubrova - International Conference on Information …, 2022 - Springer
Creating a good deep learning model is an art which requires expertise in deep learning
and a large set of labeled data for training neural networks. Neither is readily available. In …