2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2021
DOI: 10.1109/host49136.2021.9702284
|View full text |Cite
|
Sign up to set email alerts
|

Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…Fig. 8a shows the leakage distribution as the Bias increases (from 3 the maximum and average leakages shows similar distributions the top to the bottom plot), whereas Fig. 8b is showing the corresponding SNR levels of the different designs.…”
Section: Simulated Asic-model Correspondencementioning
confidence: 93%
See 2 more Smart Citations
“…Fig. 8a shows the leakage distribution as the Bias increases (from 3 the maximum and average leakages shows similar distributions the top to the bottom plot), whereas Fig. 8b is showing the corresponding SNR levels of the different designs.…”
Section: Simulated Asic-model Correspondencementioning
confidence: 93%
“…In Fig. 6b the leakage distribution of the minimum current (in each clockcycle) is shown per each of these settings 3 . The important and interesting aspect which we can observe is that as more and more bits are utilized by the randomizer, the leakage distributes more and is becoming more and more uniform as discussed above.…”
Section: Simulated Asic-model Correspondencementioning
confidence: 99%
See 1 more Smart Citation
“…More precisely, it may be possible to perform a template attack against the permutations, so that using a single trace, the adversary could recover all n permutations and eventually the secret-key. We refer to [KAA21] for an example of such attack.…”
Section: Complexity the Time Complexity Of The Algorithm Ismentioning
confidence: 99%
“…Multiple algorithmic approaches have been proposed [5,9,10,15,18] for this. Karabulut et al presented the first power side-channel attack on fixed weight sampling [14], targeting NTRU, Streamlined NTRU Prime, and Dilithium. Recently, Guo et al [12] introduced an attack on HQC and BIKE utilizing the fixed weight polynomial sampling with variable timing depending on the seed.…”
Section: Introductionmentioning
confidence: 99%