2021
DOI: 10.46586/tches.v2022.i1.414-460
|View full text |Cite
|
Sign up to set email alerts
|

Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography

Abstract: Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography. While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing research effort, a cost analysis of efficient side-channel countermeasures is still lacking. In this work, we propose a masked HW/SW codesign of the NIST PQC finalists Kyber and Saber, suitable for their different characteristics. Among others, we present a novel maske… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
14
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 35 publications
(15 citation statements)
references
References 30 publications
0
14
0
Order By: Relevance
“…where we can get to Equation 7if τ is large enough to avoid any error due to the flooring operation, as proven in [24]. Note that the flooring operation, the multiplications and the shift operation are performed independently on each share.…”
Section: A2b and Compressionmentioning
confidence: 98%
See 4 more Smart Citations
“…where we can get to Equation 7if τ is large enough to avoid any error due to the flooring operation, as proven in [24]. Note that the flooring operation, the multiplications and the shift operation are performed independently on each share.…”
Section: A2b and Compressionmentioning
confidence: 98%
“…prime q. While the power-of-two technique is relatively straightforward, the necessary adaptations to make this technique work for prime moduli were introduced by Fritzmann et al [24].…”
Section: A2b and Compressionmentioning
confidence: 99%
See 3 more Smart Citations