1 |
C. Du et al. "Towards efficient discrete gaussian sampling for lattice-based cryptography," FPL, pp.1-6, 2015.
|
2 |
P. Longa et al. "Speeding up the number theoretic transform for faster ideal lattice-based cryptography," CANS, pp. 124-139, 2016.
|
3 |
Kocher, Paul C. "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems." Annual International Cryptology Conference, Springer, Berlin, Heidelberg, 1996.
|
4 |
Kocher, Paul, Joshua Jaffe, and Benjamin Jun. "Differential power analysis." Advances in cryptology-CRYPTO'99, Springer Berlin/Heidelberg, 1999.
|
5 |
Quisquater, Jean-Jacques, and David Samyde. "Electromagnetic analysis (ema): Measures and counter-measures for smart cards." Smart Card Programming and Security, pp. 200-210, 2001.
|
6 |
Biham, Eli, and Adi Shamir. "Differential fault analysis of secret key cryptosystems." Advances in Cryptology-CRYPTO'97, pp. 513-525, 1997.
|
7 |
Schramm, Kai, Thomas Wollinger, and Christof Paar. "A new class of collision attacks and its application to DES." FSE, Vol. 2887, 2003.
|
8 |
Chari, Suresh, Josyula R. Rao, and Pankaj Rohatgi. "Template attacks." International Workshop on Cryptographic Hardware and Embedded Systems, Springer, Berlin, Heidelberg, 2002.
|
9 |
Gullasch, David, Endre Bangerter, and Stephan Krenn. "Cache games--bringing access-based cache attacks on AES to practice." Security and Privacy (SP), IEEE Symposium on. IEEE, 2011.
|
10 |
Yarom, Yuval, and Katrina Falkner. "FLUSH+ RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack." USENIX Security Symposium, 2014.
|
11 |
O. Reparaz et al. "Additively homomorphic ring-lwe masking," PQCrypto, pp. 233-244, 2016.
|
12 |
Bruinderink, Leon Groot, et al. "Flush, Gauss, and Reload-a cache attack on the BLISS lattice-based signature scheme." International Conference on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, 2016.
|
13 |
R. Primas et al. "Single-trace side-channel attacks on masked lattice based-encryption," CHES, pp. 513-533, 2017.
|
14 |
M. Saarinen, "Arithmetic coding and blinding countermeasures for lattice signatures," Cryptology eprint archive, 2016.
|
15 |
L. Ducas et al. "Lattice signatures and bimodal gaussians," CRYPTO 2013, pp.40-56, 2013.
|
16 |
M.Ajtai et al. "A public-key cryptosystem with worst-case/average-case equivalence," STOC, pp. 284-293, 1997.
|
17 |
O. Regev. "On lattices, learning with errors, random linear codes, and cryptography," STOC, 2005.
|