2013
DOI: 10.1016/j.micpro.2013.04.008
|View full text |Cite
|
Sign up to set email alerts
|

First-order collision attack on protected NTRU cryptosystem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 2 publications
0
10
0
Order By: Relevance
“…Another method would consist in finding collisions through high correlation coefficients between consecutive peaks around the area of interest (see e.g. [31] for such kind of approach in a power analysis context).…”
Section: 4mentioning
confidence: 99%
“…Another method would consist in finding collisions through high correlation coefficients between consecutive peaks around the area of interest (see e.g. [31] for such kind of approach in a power analysis context).…”
Section: 4mentioning
confidence: 99%
“…In this paper, we propose the first single trace side channel analysis (STA) against on both NTRU Open Source and NTRUEncrypt with experimental results, and propose a countermeasure. Previous SCA on NTRU [7][8][9] targeted the polynomial multiplication between the cipher-text and the secret key. However, since NTRU was patented until 2017, existing SCAs on NTRU are based on the assumption that publicized polynomial multiplications are used in the decryption process.…”
Section: Our Contributionmentioning
confidence: 99%
“…In 2013, a first-order collision attack was proposed in [8] with the purpose of incapacitating the countermeasure proposed in [7]. Their attack against the first-order countermeasure is an improvement in [8] since the attack is performed with 5,000 traces. The target of the attack was when the same registers are loaded during the multiplication.…”
Section: Previous Side Channel Analysis On Ntrumentioning
confidence: 99%
See 2 more Smart Citations