Category: Cryptography
Home Research
Noé Amiot, Quentin Meunier, Karine Heydemann, Emmanuelle Encrenaz
aLEAKator: HDL Mixed-Domain Simulation for Masked Hardware & Software Formal Verification
Cryptography

Verifying the security of masked hardware and software implementations, under advanced leakage models, remains a significant challenge, esp...

Review:

The paper introduces "aLEAKator," a novel open-source framework tackling the critical and complex challenge of formally verifying the security of mask...

View Full Research
Lili Tang, Rui Ding, Yao Sun, Xiaorui Gong
Memory Optimizations of Wagner’s Algorithm with Applications to Equihash
Cryptography

The Generalized Birthday Problem (GBP) serves as a cornerstone for a broad spectrum of cryptanalytic research. The classical solution, Wagn...

View Full Research
Hiroshi Amagasa, Rei Ueno, Naofumi Homma
AVX2 Implementation of QR-UOV for Modern x86 Processors
Cryptography

QR-UOV is a multivariate signature scheme selected as one of the candidates in the second round of the NIST PQC Additional Digital Signatur...

Review:

The paper "AVX2 Implementation of QR-UOV for Modern x86 Processors" presents a timely and highly relevant contribution to the field of post-quantum cr...

View Full Research
Stef Halmans, Christine van Vredendaal, Tobias Schneider, Frank Custers, Tim Güneysu
TWFalcon: Triple-Word Arithmetic for Falcon
Cryptography

The post-quantum signature scheme Falcon is an attractive scheme for constrained devices due to its compactness and verification performanc...

View Full Research
Yifan Dong, YoungBeom Kim, Jieyu Zheng, Zhichuang Liang, Boyue Fang, Seog Chung Seo, Maire O’Neill, Yunlei Zhao
Lightweight PQ KEM and Hybrid MQTT Protocol for 8-bit AVR Sensor Nodes
Cryptography

Most PQC schemes remain too resource-intensive for ultra-constrained 8-bit AVR wireless sensor nodes. In this work, we present a comprehens...

Review:

This paper tackles the critical challenge of deploying Post-Quantum Cryptography (PQC) on severely resource-constrained 8-bit AVR wireless sensor node...

View Full Research
Ming-Shing Chen, Chun-Ming Chiu, Chun-Tao Peng, Bo-Yin Yang
Accelerating HQC with Additive FFT
Cryptography

This paper presents an accelerated implementation of the Hamming Quasi-Cyclic (HQC) key encapsulation mechanism by leveraging additive Fast...

View Full Research
Marie Bolzer, Sébastien Duval, Marine Minier
A Tool for Lightweight (AND, XOR) Implementations of Large-Degree S-boxes
Cryptography

We propose a new ad hoc automatic tool to look for lightweight implementations of non-linear functions on up to 7 variables. This tool is m...

Review:

This paper proposes a novel "ad hoc automatic tool" aimed at discovering lightweight implementations of non-linear functions, particularly cryptograph...

View Full Research
Keng-Yu Chen, Ming Qing Ching, Jiun-Peng Chen, Bo-Yin Yang
When Masking Multiplication Isn’t Enough: Exploiting Floating-Point Leakage in Falcon’s Pre-Image Computation
Cryptography

In this paper, we present an improved correlation power analysis (CPA) attack on the pre-image computation of the digital signature scheme...

Review:

This paper presents a significant advancement in correlation power analysis (CPA) attacks targeting the pre-image computation of the Falcon digital si...

View Full Research
Yijun Cui, Yang Chen, Bei Wang, Ziying Ni, Lixia Han, Fei Lyu, Chenghua Wang, Weiqiang Liu
DRR-NTT: Efficient NTT Accelerator in Lattice-Based Cryptography By Dimensionality Reduction in RRAM
Cryptography

Lattice-based cryptographic (LBC) algorithms, including Post-Quantum Cryptography (PQC) schemes and Fully Homomorphic Encryption (FHE), rep...

Review:

This paper introduces DRR-NTT, a novel RRAM-based compute-in-memory (CIM) accelerator designed to address the performance bottlenecks of Number Theore...

View Full Research
GyuSang Kim, JeongHwan Lee, Myeonghoon Lee, Seokhie Hong, HeeSeok Kim
Secret Key Recovery of FALCON using Simple Power Analysis in Conditional Calculator
Cryptography

Among the NIST-standardized algorithms, FALCON is a lattice-based digital signature scheme that offers strong security and compactness. How...

Review:

This paper presents a critical analysis of the FALCON digital signature scheme, a NIST-standardized lattice-based algorithm recognized for its strong...

View Full Research

    Showing 1 to 10 of 15 results