Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality?
We present a side-channel attack on CRYSTALS-Dilithium, a post-quantum secure digital
signature scheme, with two variants of post-processing. The side-channel attack exploits …
signature scheme, with two variants of post-processing. The side-channel attack exploits …
Unpacking Needs Protection
Most of the previous attacks on Dilithium exploit side-channel information which is leaked
during the computation of the polynomial multiplication cs1, where s1 is a small-norm secret …
during the computation of the polynomial multiplication cs1, where s1 is a small-norm secret …
[PDF][PDF] Efficient and Secure Masking Schemes to Counteract Power Analysis Attacks in Practice
S Mangard - 2024 - barbara-gigerl.github.io
Embedded and IoT devices rely on cryptographic building blocks to protect sensitive user
data from unrestricted access. Cryptographic algorithms have been designed to provide …
data from unrestricted access. Cryptographic algorithms have been designed to provide …