Side-Channel Attacks
- A Reaction Attack Against Cryptosystems Based on LRPC Codes: Analyze cryptosystems based on Low-Rank Parity-Check (LRPC) codes. [SSP19]
- A Side-Channel Assisted Attack on NTRU: Secret key recovery through power analysis and a mittigation approach [AR21]
- A Side-channel Resistant Implementation of SABER: State of the art in terms of side channel attacks against lattice based cryptosystems and their respective countermeasures. [D20]
- Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber: Side-Channel-Analysis-Attack on the lattice-based algorithm Kyber, using leakage from the Number-Theoretic-Transform (NTT). [HHP21]
- Chosen ciphertext Simple Power Analysis on software 8-bit implementation of ring-LWE encryption: A Simple Power Analysis attack on ring-LWE based PQC schemes [PH16]
- Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs: EM/Power-Analysis Attack on the re-encryption part of the FO-Tranform [UXT22]
- Defeating NewHope with a Single Trace.: Power Attack recreating NewHope private key from measuring the power-consumption on a cortex M4 with the reference C implementation. [ACL20]
- Differential Power Analysis of XMSS and SPHINCS: Differential Power Analysis Attack on XMSS and SPHINCS through analysing different building blocks of these schemes. [KGB18]
- Differential Power Analysis of the Picnic Signature Scheme.: Multi-Trace Differential Power Attack of Picnic Signature scheme on an ARM cortex-m4. [GSE20]
- EM Side-channel Analysis on Smartphone Early Boot Encryption: Recovery of the bootcode encryption Key of a Smartphone by EM-Probing [L20]
- Fault Attacks on UOV and Rainbow: Multivariate signature schemes offer a good protection against physical fault attacks. [KL19]
- Flush, Gauss, and Reload – A Cache Attack on the BLISS Lattice-Based Signature Scheme: Recovering the private Key of the BLISS signature scheme through a cache timing sidechannel attack. [GHL16]
- Full key recovery side-channel attack against ephemeral SIKE on the Cortex-M4: Power Analysis on the Three-Point-Ladder in the PQC Algorithm SIKE [GdK21]
- Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs: EM-Sidechannel in the Error-Correction-Code of lattice-based LWE/LWR Algorithms [RSC20]
- Horizontal side-channel vulnerabilities of post-quantum key exchange protocols: Differential Power Attacks on Frodo and NewHope FPGA based implementations [ATT18]
- Improving smart card security using self-timed circuits: Encoding mechanism lowering the correlation between data and power consumption [MAC02]
- Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks: Study about fault attacks on lattice-based signature schemes [BBK16]
- Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages: Neural Network aided EM-probing based sidechannel attack [ABC19]
- On Generic Side-Channel Assisted Chosen Ciphertext Attacks on Lattice-based PKE/KEMs Towards key recovery attacks on NTRU-based PKE/KEMs: EM-Sdechannel on Lattice-based LWE/LWR PQC schemes [REB21]
- On Generic Side-Channel Assisted Chosen Ciphertext Attacks on Lattice-based PKE/KEMs: Study on different sidechannel attack methodes [PMS21]
- Physical Protection of Lattice-Based Cryptography: Challenges and Solutions: Attack and countermeasure for gaussian sampler of lattice-based schemes. [KOV18]
- Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions: Overview of several PQC-related side-channel attacks [CCA21]
- Power-based Side Channel Attack Analysis on PQC Algorithms: Summary of different Hardwarebased sidechannel attacks [TMT21]
- Resistance of Isogeny-Based Cryptographic Implementations to a Fault Attack: Private key leakage by EM-Fault injection on an ARM Cortex A53 with the SIKE PCQ algorithm. [TDE21]
- Safe-Error Attacks on SIKE and CSIDH: Four safe-error attacks, two against SIKE and two against aconstant-time implementation of CSIDH that uses dummy isogenies [CKM21]
- Security of Hedged Fiat–Shamir Signatures Under Fault Attacks: exploration of the effect of bit-tampering fault attacks in fiat-shamir signing operations [AOT20]
- Side-Channel Analysis and Countermeasure Design on ARM-based Quantum-Resistant SIKE: Side-Channel resistant implementation of saber, using masking as a countermeasure [ZYD20]
- Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations: Key-recovery with correlation power attacks [PSK18]
- Side-Channel Protections for Picnic Signatures: Study of side-channel security of MPCitH proof protocols [ABE21]
- Single-Trace Attacks on Keccak: Singe Trace Power analysis attack of keccak [KPP20]
- Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM: Power-Sidechannel Attack on the Random-Sampling and Sorting used in NTRU-HPS and some other lattice-based Schemes. [KAA21]
- Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices: Survey on Side-Channel Attacks on modern commonly used device classes [SMK18]
- Torsion point attacks on SIDH-like cryptosystems: optimization of the nearest neighbor technique used in lattice based cryptography [KL21]
- Zero-Value Side-Channel Attacks on SIKE: Power-Analysis based Sidechannel-Attack on the SIKE-PQC-Scheme [dPT22]
Last modified June 6, 2022