1 |
T. Chou. Qcbits: Constant-time small-key code-based cryptography. In Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings, pages 280-300, 2016.
|
2 |
M. Rossi, M. Hamburg, M. Hutter, and M. E. Marson. A side-channel assisted cryptanalytic attack against qcbits. In Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings, pages 3-23, 2017.
|
3 |
A. Aysu, Y. Tobah, M. Tiwari, A. Gerstlauer and M. Orshansky, "Horizontal side-channel vulnerabilities of post-quantum key exchange protocols", HOST 2018, pp. 81-88, April, 2018.
|
4 |
심보연, "민감 정보 종속 공격 및 그 응용", 국민대학교 일반대학원 2020.
|
5 |
D. Amit, A. Curiger, L. Leuenberger and P. Zbinden, "Defeating newhope with a single trace", PQCrypto 2020, pp. 189-205, April, 2020.
|
6 |
P. Ravi, S. Bhasin, S.S. Roy and A. Chattopadhyay, "Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks", ePrint 2020-549.
|
7 |
J.W. Bos, S. Friedberger, M. Martinoli, E. Oswald and M. Stam, "Assessing the feasibility of single trace power analysis of frodo", SAC 2018, pp. 216-234, August, 2018.
|
8 |
P. Ravi, S. Bhasin, S.S. Roy and A. Chattopadhyay, "On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery and Key Recovery Attacks", ePrint 2020-1559.
|
9 |
W.-L. Huang, J.-P. Chen and B.-Y. Yang, "Power Analysis on NTRU Prime", TCHES 2020, No. 1, pp. 123-151, November, 2019.
|
10 |
B.-Y. Sim, J. Kwon, J. Lee, I.-J. Kim, T. Lee, J. Han, H. Yoon, J. Cho and D.-G. Han, "Single-Trace Attacks on Message Encoding in Lattice-Based KEMs", IEEE Access 2020, Vol. 8, pp. 183175-183191, October, 2020.
|
11 |
심보연, 한재승, 이태호, 김일주, 한동국, "NIST Round 2 후보 격자 기반 KEM NTRU LPRime에 대한 신규 단일 파형 공격", 한국정보보호학회 하계학술대회 2020.
|