2020
DOI: 10.1007/978-3-030-44223-1_4
|View full text |Cite
|
Sign up to set email alerts
|

Isochronous Gaussian Sampling: From Inception to Implementation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 20 publications
(22 citation statements)
references
References 39 publications
0
22
0
Order By: Relevance
“…It is well-known that this can be addressed using the polynomial approximation techniques used e.g. in [47,4,24], but full precision estimates for the required functions are left as future work. 14 It will soon be available on a public repository.…”
Section: Implementation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…It is well-known that this can be addressed using the polynomial approximation techniques used e.g. in [47,4,24], but full precision estimates for the required functions are left as future work. 14 It will soon be available on a public repository.…”
Section: Implementation Resultsmentioning
confidence: 99%
“…First, our signature scheme can be easily made isochronous. According to [24], isochrony ensures independence between the running time of the algorithm and the secret values. For our signature, the absence of conditional branches implies that one can implement our signature isochronously using standard techniques.…”
Section: Side-channel Countermeasurementioning
confidence: 99%
See 1 more Smart Citation
“…Earlier works with embedded and original DGS strategies are [Alkim et al 2019], presenting the qTESLA digital signature scheme, [Alkim et al 2020], presenting the FrodoKEM key encapsulation scheme, and [Howe et al 2019], presenting the FALCON digital signature scheme. All of these have joined the NIST competition [CSRC 2022].…”
Section: Related Workmentioning
confidence: 99%
“…Assumption DGS strategy DiGS (ours) RLWE CLT and FWHT BLISS [Ducas et al 2013] SIS Inversion and rejection FALCON [Howe et al 2019] NTRU CDT and rejection FrodoKEM [Alkim et al 2020] LWE CDT qTESLA [Alkim et al 2019 Additionally, comprehensive web pages listing DGS works in lattice-based cryptography can be found on [Micciancio 2022, Bernstein et al 2022. As for DGS isochronous implementation, [Reparaz et al 2016] presents an assessment tool, available in the public domain.…”
Section: Samplermentioning
confidence: 99%