참고문헌
- P. Shor, "Algorithms for quantum computation: Discrete logarithms and factoring," Proceedings of the 35th Annual Symposium on Foundations of Computer Science, pp. 124-134, 1994.
- P. Kocher, "Timing Attacks on Implementation of Diffie-Hellman, RSA, DSS, and Other Systems," CRYPTO'96, LNCS 1109, pp. 104-113, 1996.
- J. Coron, "Resistance against differential power analysis for elliptic curve cryptosystems," CHES'99, LNCS 1717, pp. 292-302, 1999.
- T. Messerges, E. Dabbis, and R. Sloan, "Power analysis attacks of modular exponentiation in smartcard," CHES'99, LNCS 1717, pp. 144-157, 1999.
- E. Biham and A. Shamir, "Differential fault analysis of secret key cryptosystems," CRYPTO'97. LNCS 1294, pp. 513-525, 1997.
- D. Boneh, R. DeMillo, and R. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults," EUROCRYPT'97, LNCS 1233, pp. 37-51, 1997.
- J. Hoffstein, J. Pipher, and J. Silverman, "NTRU: A Ring-Based Public Key Cryptosystem," ANTS'98, LNCS 1423, pp. 267-288, 1998.
- J. Hoffstein, J. Pipher, and J. Silverman, "NSS: An NTRU latticebased signature scheme," EUROCRYPT'01, LNCS 2045, pp. 211-228, 2001.
- J. Hoffstein, N. Graham, J. Pipher, J. Silverman, and W. Whyte, "NTRUSign: Digital signatures using the NTRU lattice," CT-RSA'03, LNCS 2612, pp. 122-140, 2003.
- IEEE P1363.1: "Public-Key Cryptographic Techniques Based on Hard Problems over Lattices," version D12, 2008.
- M. Taha and T. Eisenbarth. "Implementation Attacks on Post-Quantum Cryptographic Schemes," IACR Cryptology ePrint Archive 2015/1083, 2015.
- A. Kamal and A. Youssef., "Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks," Journal of Cryptographic Engineering, pp. 227-240, 2013.
- A. A. Kamal and A. M. Youssef. "Fault analysis of the NTRUSign digital signature scheme," Cryptography and Communications, pp. 131-144, 2012.
- J. Hoffstein, N. Howgrave-Graham, J. Pipher, and W. Whyte, "Practical lattice-based cryptography: NTRUEncrypt and NTRUSign," The LLL Algorithm : Survey and Applications Information Security and Cryptography, pp. 349-390, Springer, 2010.
- J. Hoffstein, N. Howgrave-Graham, J. Pipher, and W. Whyte, "Performance improvements and a baseline parameter generation algorithm for NTRUSign," In Proc. of Workshop on Mathematical Problems and Techniques in Cryptology, pp. 99-126, Barcelone, Spain, 2005.
- P. Rauzy and S. Guillry. "Countermeasure against high-order faultinjection attacks on CRT-RSA,"