Error detection schemes assessed on FPGA for multipliers in lattice-based key encapsulation mechanisms in post-quantum cryptography

AC Canto, A Sarker, J Kaur… - … on Emerging Topics …, 2022 - ieeexplore.ieee.org
Advances in quantum computing have brought the need for develo** public-key
cryptosystems secure against attacks potentially enabled by quantum computers. In late …

Too many hints–when lll breaks lwe

A May, J Nowakowski - International Conference on the Theory and …, 2023 - Springer
All modern lattice-based schemes build on variants of the LWE problem. Information
leakage of the LWE secret s∈ Z qn is usually modeled via so-called hints, ie, inner products …

Exploring decryption failures of bike: New class of weak keys and key recovery attacks

T Wang, A Wang, X Wang - Annual International Cryptology Conference, 2023 - Springer
Code-based cryptography has received a lot of attention recently because it is considered
secure under quantum computing. Among them, the QC-MDPC based scheme is one of the …

[PDF][PDF] High-order masking of NTRU

JS Coron, F Gérard, M Trannoy… - IACR Transactions on …, 2023 - orbilu.uni.lu
The main protection against side-channel attacks consists in computing every function with
multiple shares via the masking countermeasure. While the masking countermeasure was …

Recovering rainbow's secret key with a first-order fault attack

T Aulbach, T Kovats, J Krämer, S Marzougui - International Conference on …, 2022 - Springer
Rainbow, a multivariate digital signature scheme and third round finalist in NIST's PQC
standardization process, is a layered version of the unbalanced oil and vinegar (UOV) …

Decoding McEliece with a Hint–Secret Goppa Key Parts Reveal Everything

E Kirshanova, A May - … Conference on Security and Cryptography for …, 2022 - Springer
We consider the McEliece cryptosystem with a binary Goppa code C⊂ F 2 n specified by an
irreducible Goppa polynomial g (x)∈ F 2 m [X] and Goppa points (α 1,…, α n)∈ F 2 mn …

Binary-Tree-Fed Mixnet: An Efficient Symmetric Encryption Solution

DA López-García, J Pérez Torreglosa, D Vera… - Applied Sciences, 2024 - mdpi.com
Mixnets are an instrument to achieve anonymity. They are generally a sequence of servers
that apply a cryptographic process and a permutation to a batch of user messages. Most use …

Hybrid Decoding–Classical-Quantum Trade-Offs for Information Set Decoding

A Esser, S Ramos-Calderer, E Bellini, JI Latorre… - … Conference on Post …, 2022 - Springer
The security of code-based constructions is usually assessed by Information Set Decoding
(ISD) algorithms. In the quantum setting, amplitude amplification yields an asymptotic square …

Leaky mceliece: Secret key recovery from highly erroneous side-channel information

M Brinkmann, C Chuengsatiansup, A May… - Cryptology ePrint …, 2023 - eprint.iacr.org
The McEliece cryptosystem is a strong contender for post-quantum schemes, including key
encapsulation for confidentiality of key exchanges in network protocols. A McEliece secret …

Quantum computers: The need for a new cryptographic strategy

B Hale, N Bindel, DL Van Bossuyt - Handbook for Management of Threats …, 2023 - Springer
The emerging technology of quantum computing is a double-edged sword, prime for
increased computing efficiency but also constituting a looming threat against many currently …