1 |
P. Shor, "Algorithms for quantum computation: Discrete logarithms and factoring," Proceedings of the 35th Annual Symposium on Foundations of Computer Science, pp. 124-134, Nov. 1994.
|
2 |
P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Proceedings of the 16th Annual International Cryptology Conference, pp. 104-113, Aug. 1996.
|
3 |
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," Proceedings of the 19th Annual International Cryptology Conference, pp. 388-397, Aug. 1999.
|
4 |
C. Chen, T. Eisenbarth, I.V. Maurich, and R. Steinwandt, "Differential Power Analysis of a McEliece Cryptosystem," Proceedings of the 13th International Conference on Applied Cryptography and Network Security, pp. 538-556, Jun. 2015.
|
5 |
M.K. Lee, J.E. Song, D.H. Choi, and D.G. Han, "Countermeasures against the power analysis attack for the NTRU public key cryptosystem," IEICE Transactions on Fundamentals of Electronics on Communications and Computer Sciences, vol.E93-A, no.1, pp.153-163, Jan. 2010.
DOI
|
6 |
Z. Liu, H. Seo, S. Roy, J. GroBschadl, H. Kim, and I. Verbauwhede, "Efficient Ring-LWE encryption on 8-bit AVR processors," Proceedings of the 17th Workshop on Cryptographic Hardware and Embedded Systems, pp. 663-682, Sep. 2015.
|
7 |
V. Lyubashevsky, C. Peikert, and O. Regev, "On Ideal Lattices and Learning with Errors over Rings," Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 1-23, Jun. 2010.
|
8 |
S. Roy, F. Vercauteren, N. Mentens, D. Chen, and I. Verbauwhede, "Compact ring-LWE cryptoprocessor," Proceedings of the 16th Workshop on Cryptographic Hardware and Embedded Systems, pp. 371-391, Sep. 2014.
|
9 |
N. Gottert, T. Feller, M. Schneider, J. Buchmann, and S. Huss, "On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes," Proceedings of the 14th Workshop on Cryptographic Hardware and Embedded Systems, pp. 512-529, Sep. 2012.
|
10 |
G. Perin, L. Imbert, L. Torres, and P Maurine, "Practical analysis of rsa countermeasures against side-channel electromagnetic attacks," Proceedings of the 12th Smart Card Research and Advanced Application Conference, pp. 200-215, Nov. 2013.
|
11 |
A. Park and D,G. Han, "Chosen ciphertext Simple Power Analysis on software 8-bit implementation of ring-LWE encryption," Proceedings of the Hardware-Oriented Security and Trust (AsianHOST), pp. 1-6, Dec. 2016.
|
12 |
A. Park, Y.S. Won and D,G. Han, "Chosen Ciphertext SPA attack on ring-LWE cryptosystem," CISC-W'16, D1-3, Dec. 2016.
|
13 |
O. Reparaz, R. de Clercq, S. Roy, F. Vercauteren, and I. Verbauwhede, " Additively homomorphic ring-LWE masking," Proceedings of the 7th International Conference on Post-Quantum Cryptography, pp. 233-244, Feb. 2016.
|
14 |
O. Reparaz, S. Roy, F. Vercauteren, and I. Verbauwhede, "A masked ring-LWE implementation," Proceedings of the 17th Workshop on Cryptographic Hardware and Embedded Systems, pp. 683-702, Sep. 2015.
|