Proceedings of the 16th International Joint Conference on E-Business and Telecommunications 2019
DOI: 10.5220/0007834800610071
|View full text |Cite
|
Sign up to set email alerts
|

BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON Signature Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…Besides this timing attack another team [21] created a fault attack that could also retrieve the private key, but they propose a countermeasure for this is detecting the fault attack by verifying the own signature, which can take further advantage of FALCONs fast ( 3ms) verification time.…”
Section: Falcon and Dilithiummentioning
confidence: 99%
“…Besides this timing attack another team [21] created a fault attack that could also retrieve the private key, but they propose a countermeasure for this is detecting the fault attack by verifying the own signature, which can take further advantage of FALCONs fast ( 3ms) verification time.…”
Section: Falcon and Dilithiummentioning
confidence: 99%
“…Attacks against lattice based signature schema have also been practically demonstrated using ARM Cortex-M4 as target [31]. Similar principles have been exploited to recover the key of the FALCON algorithm [32].…”
Section: Lattice-based Cryptography In Hardwarementioning
confidence: 99%
“…As noted above, the side-channel security of Fiat-Shamir latticebased signature has been studied extensively, including in [7,43,14,6,4,50]. However, the only implementation attacks we are aware of against hash-and-sign schemes are fault analysis papers [15,35]: side-channel attacks have not been described so far to the best of our knowledge.…”
Section: Related Workmentioning
confidence: 99%
“…As a result, the recovery algorithm has to be combined with some pruned tree search in order to account for approximate inputs. In practice, for the larger parameters of DLP signatures (with a claimed security level of 192 bits), we manage to recover the key with good probability using 2 33 to 2 35 DLP timing traces.…”
Section: Introductionmentioning
confidence: 99%