Side-channel analysis of lattice-based post-quantum cryptography: Exploiting polynomial multiplication

C Mujdei, L Wouters, A Karmakar, A Beckers… - ACM Transactions on …, 2024 - dl.acm.org
Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic
Transform are fundamental building blocks for lattice-based post-quantum cryptography. In …

[PDF][PDF] Improved plantard arithmetic for lattice-based cryptography

J Huang, J Zhang, H Zhao, Z Liu… - IACR Transactions …, 2022 - scholars.cityu.edu.hk
This paper presents an improved Plantard's modular arithmetic (Plantard arithmetic) tailored
for Lattice-Based Cryptography (LBC). Based on the improved Plantard arithmetic, we …

High-order polynomial comparison and masking lattice-based encryption

JS Coron, F Gérard, S Montoya, R Zeitoun - Cryptology ePrint Archive, 2021 - eprint.iacr.org
The main protection against side-channel attacks consists in computing every function with
multiple shares via the masking countermeasure. For IND-CCA secure lattice-based …

Dcryp-unit: Crypto hardware accelerator unit design for elliptic curve point multiplication

AR Alharbi, MM Hazzazi, SS Jamal, A Aljaedi… - IEEE …, 2024 - ieeexplore.ieee.org
We propose a hardware-optimized design that implements a Montgomery Elliptic-curve
point multiplication Algorithm over using Lopez-Dahab projective coordinates. Moreover, we …

{OpenSSLNTRU}: Faster post-quantum {TLS} key exchange

DJ Bernstein, BB Brumley, MS Chen… - 31st USENIX security …, 2022 - usenix.org
OpenSSLNTRU: Faster post-quantum TLS key exchange Page 1 This paper is included in
the Proceedings of the 31st USENIX Security Symposium. August 10–12, 2022 • Boston, MA …

High-speed design of post quantum cryptography with optimized hashing and multiplication

M Imran, A Aikata, SS Roy… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this brief, we realize different architectural techniques for improving the performance of
post-quantum cryptography (PQC) algorithms when implemented as hardware accelerators …

High-order table-based conversion algorithms and masking lattice-based encryption

JS Coron, F Gérard, S Montoya… - IACR Transactions on …, 2022 - orbilu.uni.lu
Masking is the main countermeasure against side-channel attacks on embedded devices.
For cryptographic algorithms that combine Boolean and arithmetic masking, one must …

Roulette: A diverse family of feasible fault attacks on masked kyber

J Delvaux - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Abstract At Indocrypt 2021, Hermelink, Pessl, and Pöppelmann presented a fault attack
against Kyber in which a system of linear inequalities over the private key is generated and …

Polynomial multiplication on embedded vector architectures

H Becker, JMB Mera, A Karmakar, J Yiu… - Cryptology ePrint …, 2021 - eprint.iacr.org
High-degree, low-precision polynomial arithmetic is a fundamental computational primitive
underlying structured lattice based cryptography. Its algorithmic properties and suitability for …

Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism

S Kundu, A Ghosh, A Karmakar, S Sen… - arxiv preprint arxiv …, 2025 - arxiv.org
Resource-constrained devices such as wireless sensors and Internet of Things (IoT) devices
have become ubiquitous in our digital ecosystem. These devices generate and handle a …