1 |
S.J. An, S.R. Kim, S.H. Jin, H.B. Kim, H.S. Kim, "Single Trace Side Channel Analysis on NTRU Implementation", MDPI Applied Sciences, 2018, 8(11)
|
2 |
D.J. Bernstein, "Cache-timing attacks on AES", Citeseer, 2005.
|
3 |
B.Y. SIM, J.H. Kwon, J.H. LEE, I.J. Kim, T.H. Lee, J.S. Han, H.J. Yoon, J.H. Cho, D.G. Han, "Single-Trace Attacks on Message Encoding in Lattice-Based KEMs", IEEE ACCESS, 2020, pp 183175-183191.
DOI
|
4 |
M.K. Lee, J. Song, D.H. Choi, D.G. Han. Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem. IEICE Transactions. (2010)
|
5 |
Primas R., Pessl P., Mangard S. (2017) Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption. In: Fischer W., Homma N. (eds) Cryptographic Hardware and Embedded Systems - CHES 2017. CHES 2017. Lecture Notes in Computer Science, vol 10529. Springer, Cham.
|
6 |
P. Ravi, D.B. Roy, S. Bhasin, A. Chattopadhyay, D. Mukhopadhyay3, "Number "Not Used" Once - Practical fault attack on pqm4 implementation of NIST candidates", Constructive Side-Channel Analysis and Secure Design (COSADE), 2019, pp 232-250
|
7 |
L.G. Bruinderink, P. Pessl, "Differential Fault Attacks on Deterministic Lattice Signatures", CHES, 2018, 21-43.
|
8 |
P. Ravi, D.B. Roy, S. Bhasin, A. Chattopadhyay, D. Mukhopadhyay3, "Number "Not Used" Once - Practical fault attack on pqm4 implementation of NIST candidates", Constructive Side-Channel Analysis and Secure Design (COSADE), 2019, pp 232-250
|
9 |
P. W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quatum-computer", SIAM review, 1999, pp 303-332.
|
10 |
L.G. Bruinderink, A.T. Hülsing, T. Lange, Y. Yarom, "Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme", CHES, 2016, pp 323-345.
|
11 |
A. Khalid, J. Howe, C. Rafferty, M. O'Neill, "Time-independent discrete Gaussian sampling for post-quantum cryptography", IEEE International Conference on Field-Programmable Technology (FPT), 2016.
|
12 |
A. Karmakar, S.S. Roy, O. Reparaz, F. Vercauteren, I. Verbauwhede, "Constant-Time Discrete Gaussian Sampling", IEEE TRANSATION ON COMPUTERS, VOL 67, 2018.
|
13 |
S.R.Kim, S.H. Hong, "Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure", MDPI Appl. Sci. 2018, 8, 1809.
|
14 |
Beirendonck, M.V., D'Anvers, J., Karmakar, A., Balasch, J., & Verbauwhede, I. (2020). A Side-Channel Resistant Implementation of SABER. IACR Cryptol. ePrint Arch., 2020, 733.
|