Hertzbleed: Turning power {Side-Channel} attacks into remote timing attacks on x86

Y Wang, R Paccagnella, ET He, H Shacham… - 31st USENIX Security …, 2022 - usenix.org
Power side-channel attacks exploit data-dependent variations in a CPU's power
consumption to leak secrets. In this paper, we show that on modern Intel (and AMD) x86 …

Strong non-interference and type-directed higher-order masking

G Barthe, S Belaïd, F Dupressoir, PA Fouque… - Proceedings of the …, 2016 - dl.acm.org
Differential power analysis (DPA) is a side-channel attack in which an adversary retrieves
cryptographic material by measuring and analyzing the power consumption of the device on …

A side-channel-resistant implementation of SABER

MV Beirendonck, JP D'anvers, A Karmakar… - ACM Journal on …, 2021 - dl.acm.org
The candidates for the NIST Post-Quantum Cryptography standardization have undergone
extensive studies on efficiency and theoretical security, but research on their side-channel …

Bitslicing arithmetic/boolean masking conversions for fun and profit: with application to lattice-based kems

O Bronchain, G Cassiers - IACR Transactions on Cryptographic …, 2022 - er.ceres.rub.de
The performance of higher-order masked implementations of lattice-based based key
encapsulation mechanisms (KEM) is currently limited by the costly conversions between …

Side-channel attacks on BLISS lattice-based signatures: Exploiting branch tracing against strongswan and electromagnetic emanations in microcontrollers

T Espitau, PA Fouque, B Gérard… - Proceedings of the 2017 …, 2017 - dl.acm.org
In this paper, we investigate the security of the BLISS lattice-based signature scheme, one of
the most promising candidates for postquantum-secure signatures, against side-channel …

Practical CCA2-secure and masked ring-LWE implementation

T Oder, T Schneider, T Pöppelmann… - Cryptology ePrint …, 2016 - eprint.iacr.org
During the last years public-key encryption schemes based on the hardness of ring-LWE
have gained significant popularity. For real-world security applications assuming strong …

Improved gadgets for the high-order masking of dilithium

JS Coron, F Gérard, M Trannoy… - IACR Transactions on …, 2023 - bmt.ub.rub.de
We present novel and improved high-order masking gadgets for Dilithium, a post-quantum
signature scheme that has been standardized by the National Institute of Standards and …

Lightweight AEAD and hashing using the sparkle permutation family

C Beierle, A Biryukov, LC dos Santos… - IACR Transactions …, 2020 - research.ed.ac.uk
We introduce the Sparkle family of permutations operating on 256, 384 and 512 bits. These
are combined with the Beetle mode to construct a family of authenticated ciphers …

Masking the GLP lattice-based signature scheme at any order

G Barthe, S Belaïd, T Espitau, PA Fouque… - Advances in Cryptology …, 2018 - Springer
Recently, numerous physical attacks have been demonstrated against lattice-based
schemes, often exploiting their unique properties such as the reliance on Gaussian …

[PDF][PDF] Schwaemm and esch: lightweight authenticated encryption and hashing using the sparkle permutation family

C Beierle, A Biryukov, LC dos Santos, J Großschädl… - NIST round, 2019 - lab.las3.de
With the advent of the Internet of Things (IoT), a myriad of devices are being connected to
one another in order to exchange information. This information has to be secured …