Cold Boot Attacks on Ring and Module LWE Keys Under the NTT
In this work, we consider the ring- and module- variants of the LWE problem and investigate cold boot attacks on cryptographic schemes based on these problems, wherein an attacker is faced with the problem of recovering a scheme’s secret key from a noisy version of that key. The leakage resilience o...
Main Authors: | Martin R. Albrecht, Amit Deo, Kenneth G. Paterson |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2018-08-01
|
Series: | Transactions on Cryptographic Hardware and Embedded Systems |
Subjects: | |
Online Access: | https://tches.iacr.org/index.php/TCHES/article/view/7273 |
Similar Items
-
Cold Boot Attacks on LUOV
by: Ricardo Villanueva-Polanco
Published: (2020-06-01) -
Hybrid dual attack on LWE with arbitrary secrets
by: Lei Bi, et al.
Published: (2022-08-01) -
<i>R</i>-LWE-Based Distributed Key Generation and Threshold Decryption
by: Ferran Alborch, et al.
Published: (2022-02-01) -
Security estimation of LWE via BKW algorithms
by: Yu Wei, et al.
Published: (2023-09-01) -
The Ring-LWE Problem in Lattice-Based Cryptography: The Case of Twisted Embeddings
by: Jheyne N. Ortiz, et al.
Published: (2021-08-01)