Correction Fault Attacks on Randomized CRYSTALS-Dilithium
After NIST’s selection of Dilithium as the primary future standard for quantum-secure digital signatures, increased efforts to understand its implementation security properties are required to enable widespread adoption on embedded devices. Concretely, there are still many open questions regarding...
Những tác giả chính: | Elisabeth Krahmer, Peter Pessl, Georg Land, Tim Güneysu |
---|---|
Định dạng: | Bài viết |
Ngôn ngữ: | English |
Được phát hành: |
Ruhr-Universität Bochum
2024-07-01
|
Loạt: | Transactions on Cryptographic Hardware and Embedded Systems |
Những chủ đề: | |
Truy cập trực tuyến: | https://tches.iacr.org/index.php/TCHES/article/view/11673 |
Những quyển sách tương tự
-
From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium
Bằng: Mohamed ElGhamrawy, et al.
Được phát hành: (2023-08-01) -
In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium
Bằng: Huaxin Wang, et al.
Được phát hành: (2024-06-01) -
Parallel implementation of CRYSTALS-Dilithium for effective signing and verification in autonomous driving environment
Bằng: Seog Chung Seo, et al.
Được phát hành: (2023-02-01) -
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks
Bằng: Olivier Bronchain, et al.
Được phát hành: (2024-03-01) -
CDBS: blind signature scheme based on CRYSTALS-Dilithium algorithm
Bằng: YANG Yatao, et al.
Được phát hành: (2024-07-01)