2021
DOI: 10.1007/978-3-030-92075-3_2
|View full text |Cite
|
Sign up to set email alerts
|

Fault-Injection Attacks Against NIST’s Post-Quantum Cryptography Round 3 KEM Candidates

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(15 citation statements)
references
References 58 publications
0
15
0
Order By: Relevance
“…has similar query complexity as the attacks in [29] and [11], it is different to mitigate than the one previous SIDH fault attack, known as Ti's attack [25], can be combined with the side-channel attack in [26] to achieve full key recovery in SIKE.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…has similar query complexity as the attacks in [29] and [11], it is different to mitigate than the one previous SIDH fault attack, known as Ti's attack [25], can be combined with the side-channel attack in [26] to achieve full key recovery in SIKE.…”
Section: Discussionmentioning
confidence: 99%
“…Nevertheless, the new attack in this paper and the ones from [26] and [29] use valid public keys such that R = (P − Q ) always holds, and thus our attack is completely immune to Tasso et al's countermeasure and any other variant of it.…”
Section: Instances E3mentioning
confidence: 96%
See 3 more Smart Citations