Review on hybrid deep learning models for enhancing encryption techniques against side channel attacks

AA Ahmed, MK Hasan, AH Aman, N Safie… - IEEE …, 2024 - ieeexplore.ieee.org
During the years 2018-2024, considerable advancements have been achieved in the use of
deep learning for side channel attacks. The security of cryptographic algorithm …

Breaking a fifth-order masked implementation of crystals-kyber by copy-paste

E Dubrova, K Ngo, J Gärtner, R Wang - … of the 10th ACM Asia public-key …, 2023 - dl.acm.org
CRYSTALS-Kyber has been selected by the NIST as a public-key encryption and key
encapsulation mechanism to be standardized. It is also included in the NSA's suite of …

[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

Masking kyber: First-and higher-order implementations

JW Bos, M Gourjon, J Renes, T Schneider… - IACR Transactions on …, 2021 - incs.ub.rub.de
In the final phase of the post-quantum cryptography standardization effort, the focus has
been extended to include the side-channel resistance of the candidates. While some …

A review and comparison of AI-enhanced side channel analysis

M Panoff, H Yu, H Shan, Y ** - ACM Journal on Emerging Technologies …, 2022 - dl.acm.org
Side Channel Analysis (SCA) presents a clear threat to privacy and security in modern
computing systems. The vast majority of communications are secured through cryptographic …

Masked accelerators and instruction set extensions for post-quantum cryptography

T Fritzmann, M Van Beirendonck… - IACR …, 2022 - philosophymindscience.org
Side-channel attacks can break mathematically secure cryptographic systems leading to a
major concern in applied cryptography. While the cryptanalysis and security evaluation of …

Side-channel and fault-injection attacks over lattice-based post-quantum schemes (Kyber, Dilithium): Survey and new results

P Ravi, A Chattopadhyay, JP D'Anvers… - ACM Transactions on …, 2024 - dl.acm.org
In this work, we present a systematic study of Side-Channel Attacks (SCA) and Fault
Injection Attacks (FIA) on structured lattice-based schemes, with main focus on Kyber Key …

First-order masked Kyber on ARM Cortex-M4

D Heinz, MJ Kannwischer, G Land… - Cryptology ePrint …, 2022 - eprint.iacr.org
In this work, we present a fast and first-order secure Kyber implementation optimized for
ARM Cortex-M4. Most notably, to our knowledge this is the first liberally-licensed open …

Attacking and defending masked polynomial comparison for lattice-based cryptography

S Bhasin, JP D'Anvers, D Heinz… - IACR Transactions on …, 2021 - tosc.iacr.org
In this work, we are concerned with the hardening of post-quantum key encapsulation
mechanisms (KEM) against side-channel attacks, with a focus on the comparison operation …

Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates

K Xagawa, A Ito, R Ueno, J Takahashi… - Advances in Cryptology …, 2021 - Springer
We investigate all NIST PQC Round 3 KEM candidates from the viewpoint of fault-injection
attacks: Classic McEliece, Kyber, NTRU, Saber, BIKE, FrodoKEM, HQC, NTRU Prime, and …