2022
DOI: 10.1007/978-3-030-99766-3_11
|View full text |Cite
|
Sign up to set email alerts
|

Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…More recently, Azouaoui considered the case of Kyber as an example of Simple Power Analysis (SPA) against the re-encryption of schemes using the FO transformation and the Differential Power Analysis (DPA) against the decryption, with shortcut formulas in order to compare their strengths in function of the noise level [17]. They evaluated the cost of preventing them with masking and later discuss tweaks to improve the situation and enable a better leveling of the countermeasures.…”
Section: Side-channel Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…More recently, Azouaoui considered the case of Kyber as an example of Simple Power Analysis (SPA) against the re-encryption of schemes using the FO transformation and the Differential Power Analysis (DPA) against the decryption, with shortcut formulas in order to compare their strengths in function of the noise level [17]. They evaluated the cost of preventing them with masking and later discuss tweaks to improve the situation and enable a better leveling of the countermeasures.…”
Section: Side-channel Attacksmentioning
confidence: 99%
“…The motivation of this proposal comes from the fact that several publications (v.gr. [10,13,16,17]) present attacks against the re-encryption part of the FO ⊥ transformation applied to Kyber. As explained in [17], the re-encryption process consists in running the PKE, which in the case of Kyber is only IND-CPA, so an IND-CCA adversary may have a significant advantage against the scheme.…”
Section: Transformation Without Re-encryptionmentioning
confidence: 99%