Browse > Article

NIST PQC Round 3 FALCON 전자서명 알고리즘의 전력 분석 취약점 연구  

Kim, GyuSang (고려대학교 정보보호학과)
Park, DongJun (고려대학교 정보보호학과)
Hong, SeokHee (고려대학교)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Shor, Peter W. "Algorithms for quantum computation: discrete logarithms and factoring." Proceedings 35th annual symposium on foundations of computer science. Ieee, 1994.
2 Fouque, Pierre-Alain, et al. "Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU." 2020
3 Alagic, Gorjan, et al. "Status report on the second round of the NIST post-quantum cryptography standardization process." US Department of Commerce, NIST (2020).
4 Cooley, James W., and John W. Tukey. "An algorithm for the machine calculation of complex Fourier series." Mathematics of computation 19.90 (1965): 297-301.   DOI
5 Markstein, Peter. "The new IEEE-754 standard for floating point arithmetic." Dagstuhl Seminar Proceedings. Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2008.
6 Gentry, Craig, Chris Peikert, and Vinod Vaikuntanathan. "Trapdoors for hard lattices and new cryptographic constructions." Proceedings of the fortieth annual ACM symposium on Theory of computing. 2008.
7 Kocher, Paul C. "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems." Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1996.
8 Kocher, Paul, Joshua Jaffe, and Benjamin Jun. "Differential power analysis." Annual international cryptology conference. Springer, Berlin, Heidelberg, 1999.
9 Kerry, Cameron F., and Patrick D. Gallagher. "Digital signature standard (DSS)." FIPS PUB (2013): 186-4.
10 Quisquater, Jean-Jacques, and David Samyde. "Electromagnetic analysis (ema): Measures and counter-measures for smart cards." International Conference on Research in Smart Cards. Springer, Berlin, Heidelberg, 2001.
11 Biham, Eli, and Adi Shamir. "Differential fault analysis of secret key cryptosystems." Advances in Cryptology-CRYPTO'97, pp. 513-525, 1997.
12 Brier, Eric, Christophe Clavier, and Francis Olivier. "Correlation power analysis with a leakage model." International workshop on cryptographic hardware and embedded systems. Springer, Berlin, Heidelberg, 2004.
13 Batina, Lejla, et al. "CSI neural network: Using side-channels to recover your artificial neural net- work information." arXiv preprint arXiv:1810.09076 (2018).
14 Fouque, Pierre-Alain, et al. "Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices." Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Cham, 2020.