Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks

TM Fernandez-Carames, P Fraga-Lamas - IEEE access, 2020 - ieeexplore.ieee.org
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in
the last years and their use has been suggested for numerous applications due to their …

Post-quantum cryptography

DJ Bernstein, T Lange - Nature, 2017 - nature.com
Cryptography is essential for the security of online communication, cars and implanted
medical devices. However, many commonly used cryptosystems will be completely broken …

Crystals-dilithium: A lattice-based digital signature scheme

L Ducas, E Kiltz, T Lepoint, V Lyubashevsky… - IACR Transactions on …, 2018 - tches.iacr.org
In this paper, we present the lattice-based signature scheme Dilithium, which is a
component of the CRYSTALS (Cryptographic Suite for Algebraic Lattices) suite that was …

[PDF][PDF] CRYSTALS-Kyber algorithm specifications and supporting documentation

R Avanzi, J Bos, L Ducas, E Kiltz, T Lepoint… - NIST PQC …, 2019 - pq-crystals.org
• Increase noise parameter for Kyber512 In the round-2 submission of Kyber, the decryption
error for Kyber512 was rather conservative, while at the same time, there were requests to …

Masking kyber: First-and higher-order implementations

JW Bos, M Gourjon, J Renes, T Schneider… - IACR Transactions on …, 2021 - incs.ub.rub.de
In the final phase of the post-quantum cryptography standardization effort, the focus has
been extended to include the side-channel resistance of the candidates. While some …

Lord of the ring (s): Side channel attacks on the {CPU}{On-Chip} ring interconnect are practical

R Paccagnella, L Luo, CW Fletcher - 30th USENIX Security Symposium …, 2021 - usenix.org
We introduce the first microarchitectural side channel attacks that leverage contention on the
CPU ring interconnect. There are two challenges that make it uniquely difficult to exploit this …

A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography

X Lou, T Zhang, J Jiang, Y Zhang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …

LWE with side information: attacks and concrete security estimation

D Dachman-Soled, L Ducas, H Gong… - Annual International …, 2020 - Springer
We propose a framework for cryptanalysis of lattice-based schemes, when side information—
in the form of “hints”—about the secret and/or error is available. Our framework generalizes …

A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model

E Kiltz, V Lyubashevsky, C Schaffner - … on the Theory and Applications of …, 2018 - Springer
Abstract The Fiat-Shamir transform is a technique for combining a hash function and an
identification scheme to produce a digital signature scheme. The resulting scheme is known …

Prime+ Scope: Overcoming the observer effect for high-precision cache contention attacks

A Purnal, F Turan, I Verbauwhede - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Modern processors expose software to information leakage through shared
microarchitectural state. One of the most severe leakage channels is cache contention …