We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 102 results
  1. How Fast Can SM4 be in Software?

    SM4 is a popular block cipher issued by the Office of State Commercial Cryptography Administration (OSCCA) of China. In this paper, we use the...
    **n Miao, Chun Guo, ... Weijia Wang in Information Security and Cryptology
    Conference paper 2023
  2. Binary Kummer Line

    The idea of the Kummer line was introduced by Gaudry and Lubicz [22]. Karati and Sarkar [31] proposed three efficient Kummer lines over prime fields,...
    Conference paper 2023
  3. A (Bit)slice of Rainbow

    We explore the performance impact of bitslicing on implementations of the NIST PQC Round 3 Finalist Digital Signature Algorithms: Rainbow. We show...
    Conference paper 2021
  4. Custom Instruction Support for Modular Defense Against Side-Channel and Fault Attacks

    The design of software countermeasures against active and passive adversaries is a challenging problem that has been addressed by many authors in...
    Pantea Kiaei, Darius Mercadier, ... Patrick Schaumont in Constructive Side-Channel Analysis and Secure Design
    Conference paper 2021
  5. A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling

    The sampling of polynomials with fixed weight is a procedure required by round-4 Key Encapsulation Mechanisms (KEMs) for Post-Quantum Cryptography...
    Markus Krausz, Georg Land, ... Tim Güneysu in Public-Key Cryptography – PKC 2023
    Conference paper 2023
  6. Modified lightweight GIFT cipher for security enhancement in resource-constrained IoT devices

    The internet of things (IoT) ensures flexible network services to the end devices connected to it. Although security has always been a concern for...

    Nilufar Yasmin, Richa Gupta in International Journal of Information Technology
    Article 11 September 2023
  7. A Side-Channel Attack Against Classic McEliece When Loading the Goppa Polynomial

    The NIST Post-Quantum Cryptography (PQC) standardization challenge was launched in December 2016 and recently, has released its first results. The...
    Boly Seck, Pierre-Louis Cayrel, ... Brice Colombier in Progress in Cryptology - AFRICACRYPT 2023
    Conference paper 2023
  8. Higher-Order Masked Saber

    Side-channel attacks are formidable threats to the cryptosystems deployed in the real world. An effective and provably secure countermeasure against...
    Suparna Kundu, Jan-Pieter D’Anvers, ... Ingrid Verbauwhede in Security and Cryptography for Networks
    Conference paper 2022
  9. Modified lightweight cryptography scheme and its applications in IoT environment

    Interconnected devices have been with us for a long time. The security of the data exchanged through these devices is a matter of grave concern....

    Nilufar Yasmin, Richa Gupta in International Journal of Information Technology
    Article 26 September 2023
  10. Parallel Verification of Serial MAC and AE Modes

    A large number of the symmetric-key mode of operations, such as classical CBC-MAC, have serial structures. While a serial mode gives an...
    Kazuhiko Minematsu, Akiko Inoue, ... Hiroyasu Kubo in Selected Areas in Cryptography
    Conference paper 2022
  11. Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation

    This paper reports new software implementation results for the Skinny-128 tweakable block ciphers on various SIMD architectures. More precisely, we...
    Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri in Information Security and Privacy
    Conference paper 2022
  12. Leveraging Coprocessors as Noise Engines in Off-the-Shelf Microcontrollers

    Securing low-cost microcontrollers against side-channel attacks is an important challenge. One core issue for this purpose is that such devices may...
    Balazs Udvarhelyi, François-Xavier Standaert in Smart Card Research and Advanced Applications
    Conference paper 2024
  13. Fast First-Order Masked NTTRU

    Even though Kyber is the lattice-based KEM selected for standardization by NIST, NTRU and its variants are still of great relevance to several...
    Daniel Heinz, Gabi Dreo Rodosek in Constructive Side-Channel Analysis and Secure Design
    Conference paper 2023
  14. Secret Key Recovery Attack on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber

    Shuffling is a well-known countermeasure against side-channel attacks. It typically uses the Fisher-Yates (FY) algorithm to generate a random...
    Linus Backlund, Kalle Ngo, ... Elena Dubrova in Applied Cryptography and Network Security Workshops
    Conference paper 2023
  15. On the Masking-Friendly Designs for Post-quantum Cryptography

    Masking is a well-known and provably secure countermeasure against side-channel attacks. However, due to additional redundant computations,...
    Suparna Kundu, Angshuman Karmakar, Ingrid Verbauwhede in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2024
  16. Batch Binary Weierstrass

    Bitslicing is a programming technique that offers several attractive features, such as timing attack resistance, high amortized performance in batch...
    Billy Bob Brumley, Sohaib ul Hassan, ... Kide Vuojärvi in Progress in Cryptology – LATINCRYPT 2019
    Conference paper 2019
  17. Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations

    Cryptographic implementations deployed in real world devices often aim at (provable) security against the powerful class of side-channel attacks...
    Sonia Belaïd, Pierre-Évariste Dagand, ... Raphaël Wintersdorff in Advances in Cryptology – EUROCRYPT 2020
    Conference paper 2020
  18. Probabilistic root finding in code-based cryptography

    Probabilistic algorithms for finding roots of polynomials have not been applied to code-based cryptography before. One obstacle is their non-constant...

    Dúnia Marchiori, Ricardo Custódio, ... Lucia Moura in Journal of Cryptographic Engineering
    Article 31 July 2023
  19. RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation

    Cache side channels constitute a persistent threat to crypto implementations. In particular, block ciphers are prone to attacks when implemented...
    Heiko Mantel, Lukas Scheidel, ... Tim Weißmantel in Cryptology and Network Security
    Conference paper 2020
  20. Fast Verification of Masking Schemes in Characteristic Two

    We revisit the matrix model for non-interference (NI) probing security of masking gadgets introduced by Belaïd et al. at CRYPTO 2017. This leads to...
    Nicolas Bordes, Pierre Karpman in Advances in Cryptology – EUROCRYPT 2021
    Conference paper 2021
Did you find what you were looking for? Share feedback.