2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC) 2022
DOI: 10.1109/asp-dac52403.2022.9712513
|View full text |Cite
|
Sign up to set email alerts
|

A Voltage Template Attack on the Modular Polynomial Subtraction in Kyber

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Several vulnerabilities have been discovered in the implementations of LWE/ LWR-based PKE/KEMs, including incremental storage vulnerability [21], weakness of re-encryption operation in Fujisaki-Okamoto transform [27] and weakness of polynomial multiplication [16]. For CRYSTALS-Kyber, secret key information has also been extracted through Barrentt reduction procedure [15,26].…”
Section: Known Vulnerabilitiesmentioning
confidence: 99%
“…Several vulnerabilities have been discovered in the implementations of LWE/ LWR-based PKE/KEMs, including incremental storage vulnerability [21], weakness of re-encryption operation in Fujisaki-Okamoto transform [27] and weakness of polynomial multiplication [16]. For CRYSTALS-Kyber, secret key information has also been extracted through Barrentt reduction procedure [15,26].…”
Section: Known Vulnerabilitiesmentioning
confidence: 99%