A comprehensive survey of cryptography key management systems
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …
security objectives, such as data confidentiality, authentication, and secure communication …
A side-channel attack on a bitsliced higher-order masked CRYSTALS-Kyber implementation
In response to side-channel attacks on masked implementations of post-quantum
cryptographic algorithms, a new bitsliced higher-order masked implementation of …
cryptographic algorithms, a new bitsliced higher-order masked implementation of …
Towards automated detection of single-trace side-channel vulnerabilities in constant-time cryptographic code
Although cryptographic algorithms may be mathematically secure, it is often possible to leak
secret information from the implementation of the algorithms. Timing and power side …
secret information from the implementation of the algorithms. Timing and power side …
Cache-timing attack against HQC
In this paper, we present the first chosen-ciphertext (CC) cache-timing attacks on the
reference implementation of HQC. We build a cache-timing based distinguisher for …
reference implementation of HQC. We build a cache-timing based distinguisher for …
CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP
Confidential virtual machines (VMs) promise higher security by running the VM inside a
trusted execution environment (TEE). Recent AMD server processors support confidential …
trusted execution environment (TEE). Recent AMD server processors support confidential …
A single-trace message recovery attack on a masked and shuffled implementation of CRYSTALS-Kyber
Last year CRYSTALS-Kyber was chosen by NIST as a new, post-quantum secure key
encapsulation mechanism to be standardized. This makes it important to assess the …
encapsulation mechanism to be standardized. This makes it important to assess the …
Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation
Significant advancements have been achieved in the field of quantum computing in recent
years. If somebody ever creates a sufficiently strong quantum computer, many of the public …
years. If somebody ever creates a sufficiently strong quantum computer, many of the public …
Divide and surrender: Exploiting variable division instruction timing in hqc key recovery attacks
We uncover a critical side-channel vulnerability in the Hamming Quasi-Cyclic (HQC) round 4
optimized implementation arising due to the use of the modulo operator. In some cases …
optimized implementation arising due to the use of the modulo operator. In some cases …
A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation
In response to side-channel attacks on masked implementations of post-quantum
cryptographic algorithms, a new bitsliced higher-order masked implementation of …
cryptographic algorithms, a new bitsliced higher-order masked implementation of …
[PDF][PDF] Analyzing CRYSTALS-Kyber's Susceptibility to Side Channel Attacks: An Empirical Exploration
In this research, side-channel analysis attacks against the Krystal Kyber cryptographic
scheme are empirically studied. This study explores how vulnerable Krystal Kyber is to these …
scheme are empirically studied. This study explores how vulnerable Krystal Kyber is to these …