References
- M.Ajtai et al. "A public-key cryptosystem with worst-case/average-case equivalence," STOC, pp. 284-293, 1997.
- O. Regev. "On lattices, learning with errors, random linear codes, and cryptography," STOC, 2005.
- C. Du et al. "Towards efficient discrete gaussian sampling for lattice-based cryptography," FPL, pp.1-6, 2015.
- P. Longa et al. "Speeding up the number theoretic transform for faster ideal lattice-based cryptography," CANS, pp. 124-139, 2016.
- Kocher, Paul C. "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems." Annual International Cryptology Conference, Springer, Berlin, Heidelberg, 1996.
- Kocher, Paul, Joshua Jaffe, and Benjamin Jun. "Differential power analysis." Advances in cryptology-CRYPTO'99, Springer Berlin/Heidelberg, 1999.
- Quisquater, Jean-Jacques, and David Samyde. "Electromagnetic analysis (ema): Measures and counter-measures for smart cards." Smart Card Programming and Security, pp. 200-210, 2001.
- Biham, Eli, and Adi Shamir. "Differential fault analysis of secret key cryptosystems." Advances in Cryptology-CRYPTO'97, pp. 513-525, 1997.
- Schramm, Kai, Thomas Wollinger, and Christof Paar. "A new class of collision attacks and its application to DES." FSE, Vol. 2887, 2003.
- Chari, Suresh, Josyula R. Rao, and Pankaj Rohatgi. "Template attacks." International Workshop on Cryptographic Hardware and Embedded Systems, Springer, Berlin, Heidelberg, 2002.
- Gullasch, David, Endre Bangerter, and Stephan Krenn. "Cache games--bringing access-based cache attacks on AES to practice." Security and Privacy (SP), IEEE Symposium on. IEEE, 2011.
- Yarom, Yuval, and Katrina Falkner. "FLUSH+ RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack." USENIX Security Symposium, 2014.
- Bruinderink, Leon Groot, et al. "Flush, Gauss, and Reload-a cache attack on the BLISS lattice-based signature scheme." International Conference on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, 2016.
- R. Primas et al. "Single-trace side-channel attacks on masked lattice based-encryption," CHES, pp. 513-533, 2017.
- M. Saarinen, "Arithmetic coding and blinding countermeasures for lattice signatures," Cryptology eprint archive, 2016.
- O. Reparaz et al. "Additively homomorphic ring-lwe masking," PQCrypto, pp. 233-244, 2016.
- L. Ducas et al. "Lattice signatures and bimodal gaussians," CRYPTO 2013, pp.40-56, 2013.