Browse > Article

격자 기반 차세대 양자 내성 암호에 대한 부채널 분석 기술 동향  

Kim, Suhri (고려대학교 정보보호대학원)
Kim, HanBit (고려대학교 정보보호대학원)
Kim, HeeSeok (고려대학교 사이버보안전공)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Du et al. "Towards efficient discrete gaussian sampling for lattice-based cryptography," FPL, pp.1-6, 2015.
2 P. Longa et al. "Speeding up the number theoretic transform for faster ideal lattice-based cryptography," CANS, pp. 124-139, 2016.
3 Kocher, Paul C. "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems." Annual International Cryptology Conference, Springer, Berlin, Heidelberg, 1996.
4 Kocher, Paul, Joshua Jaffe, and Benjamin Jun. "Differential power analysis." Advances in cryptology-CRYPTO'99, Springer Berlin/Heidelberg, 1999.
5 Quisquater, Jean-Jacques, and David Samyde. "Electromagnetic analysis (ema): Measures and counter-measures for smart cards." Smart Card Programming and Security, pp. 200-210, 2001.
6 Biham, Eli, and Adi Shamir. "Differential fault analysis of secret key cryptosystems." Advances in Cryptology-CRYPTO'97, pp. 513-525, 1997.
7 Schramm, Kai, Thomas Wollinger, and Christof Paar. "A new class of collision attacks and its application to DES." FSE, Vol. 2887, 2003.
8 Chari, Suresh, Josyula R. Rao, and Pankaj Rohatgi. "Template attacks." International Workshop on Cryptographic Hardware and Embedded Systems, Springer, Berlin, Heidelberg, 2002.
9 Gullasch, David, Endre Bangerter, and Stephan Krenn. "Cache games--bringing access-based cache attacks on AES to practice." Security and Privacy (SP), IEEE Symposium on. IEEE, 2011.
10 Yarom, Yuval, and Katrina Falkner. "FLUSH+ RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack." USENIX Security Symposium, 2014.
11 O. Reparaz et al. "Additively homomorphic ring-lwe masking," PQCrypto, pp. 233-244, 2016.
12 Bruinderink, Leon Groot, et al. "Flush, Gauss, and Reload-a cache attack on the BLISS lattice-based signature scheme." International Conference on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, 2016.
13 R. Primas et al. "Single-trace side-channel attacks on masked lattice based-encryption," CHES, pp. 513-533, 2017.
14 M. Saarinen, "Arithmetic coding and blinding countermeasures for lattice signatures," Cryptology eprint archive, 2016.
15 L. Ducas et al. "Lattice signatures and bimodal gaussians," CRYPTO 2013, pp.40-56, 2013.
16 M.Ajtai et al. "A public-key cryptosystem with worst-case/average-case equivalence," STOC, pp. 284-293, 1997.
17 O. Regev. "On lattices, learning with errors, random linear codes, and cryptography," STOC, 2005.