2021 IEEE 39th International Conference on Computer Design (ICCD) 2021
DOI: 10.1109/iccd53106.2021.00094
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…However, they believe that the attack goes beyond polynomial time. Subsequently, Chen et al (2021) proposed a conservative CPA method to reduce the key guessing space and a fast two-stage method to further reduce the guessing space for attacking polynomial multiplication operations. As a result, they were able to fully recover the private key using the conservative CPA method with only 157 power traces.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…However, they believe that the attack goes beyond polynomial time. Subsequently, Chen et al (2021) proposed a conservative CPA method to reduce the key guessing space and a fast two-stage method to further reduce the guessing space for attacking polynomial multiplication operations. As a result, they were able to fully recover the private key using the conservative CPA method with only 157 power traces.…”
Section: Related Workmentioning
confidence: 99%
“…At present, of the attacks targeting polynomial multiplication of Dilithium, Chen et al 's attack (Chen et al 2021) performs best. However, due to the pre-charging mechanism of CMOS circuits in ARM platform, the Hamming weight model is selected as the power consumption model.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…For the final round, in addition to key selection criterion such as classical security, theoretical PQ security guarantees, implementation cost and performance; resistance against active and passive implementation attacks, one of the most important criteria [28]. Several authors have reported physical attacks on structured lattice-based schemes through exploitation of a number of side-channels such as power [1,11,31,33,35,37,50], electromagnetic emissions [18], cache timing [21,32] and induced faults [8,10,17,34,37,38,40,47,49].…”
Section: Introductionmentioning
confidence: 99%