2017
DOI: 10.1016/j.compeleceng.2017.05.007
|View full text |Cite
|
Sign up to set email alerts
|

Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…This was changed with [8] which showed that NTRU software implementation is vulnerable to correlation power analysis including a second-order power attack, and suggested three countermeasures (randomization of ciphertext, temporary array, and encoding of the private key). A few papers then studied the power analysis of NTRU [9,10], before NIST started its Post-Quantum Cryptography (PQC) standardization process where NTRU was submitted in two variants. Then, many researchers concentrated on the implementation and found many strong leakage points.…”
Section: Related Researchmentioning
confidence: 99%
“…This was changed with [8] which showed that NTRU software implementation is vulnerable to correlation power analysis including a second-order power attack, and suggested three countermeasures (randomization of ciphertext, temporary array, and encoding of the private key). A few papers then studied the power analysis of NTRU [9,10], before NIST started its Post-Quantum Cryptography (PQC) standardization process where NTRU was submitted in two variants. Then, many researchers concentrated on the implementation and found many strong leakage points.…”
Section: Related Researchmentioning
confidence: 99%
“…By comparison, the proposed key update scheme in this work is a general solution scheme and all the keys are generated based on a primary key which is never visible outside of the TPM [41]. In [42], a shifter is used for producing randomness for the key rotation scheme. However, the shifting-based random number generator can only produce pseudo-random numbers.…”
Section: Security Analysismentioning
confidence: 99%
“…Researchers have also developed the sampling software on various platforms. For example, Inspector developed by Riscure and MathMagic [33], enables the leakage to be collected and stored on laptop computers and other advanced processors. CS can also be efficiently implemented on these platforms by integrating a small program to solve the inner product of observation matrix (see Section III-C) and power traces, thus improving sampling performance.…”
Section: B Our Contributionsmentioning
confidence: 99%