최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會誌 = KIISC review, v.32 no.1, 2022년, pp.47 - 56
이정환 (고려대학교 인공지능사이버보안학과) , 김규상 (고려대학교 정보보호대학원 정보보호학과) , 김희석 (고려대학교 인공지능사이버보안학과)
AnSoojung, KimSuhri, JinSunghyun, KimHanbit, KimHeeseok. "Single Trace Side Channel Analysis on NTRU Implementation.", Applied Sciences 8. 2018.
Askeland, Amund , and Sondre Ronjom. "A Side-Channel Assisted Attack on NTRU." IACR CryptoI. ePrint Arch.. 2021. 790.
Atici, Ali Can, Lejla Batina, Benedikt Gierlichs, and Ingrid Verbauwhede. "Power analysis on NTRU implementations for RFIDs: First results." 2008.
Bo-Yeon Sim, Jihoon Kwon, Joohoo Lee, Il-Ju Kim, Tae-Ho Lee, Hyojin Yoon, Jihoon Cho, Dong-Gak Han. "Single-trace attacks on message encoding in lattice-based KEMs", IEEE Access, 8:183175-183191, 2020
Chen, Cong , Oussama Danba, Jeffrey Hoffstein, Andreas Hulsing, Joost Rijneveld, John M Schanck, Tsunekazu Saito, Peter Schwabe, William Whyte, Keita Xagawa, Takashi Yamakawa, and Zhenfei Zhang. " NTRU Algorithm specifications and supporting documentation." Accessed. 2019.
Florian Bache, Clara Paglialong, Tobias Oder, Tobias Schneider, Tim Guneysu, "High-speed masking for polynomial comparison in lattice-based KEMs".IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020:483-507, 2020.
Joppe W. Bos, Marc Gourjon, Joost Renes, Tobias Schneider, Christine van Vredendaal, "Masking Kyber: Firstand Higher-Order Implementations", IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021:173-214, 2021.
Kalle Ngo, Elena Dubrova, Qian Guo, Thomas Johansson. "A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation", IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021:676-707, 2021.
Lee, MunKyu , JeongEun Song, Dooho Choi, and DongGuk Han. "Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem." IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. 2010. 153-163.
Michiel van Beirendonck, Jan-Peter D'anvers, Angshuman Karmakar, Josep Balasch, and Ingrid Verbauwhede. "A side-channel-resistant implementation of SABER", ACM Journal on Emerging Technologies on Computing Systems, 17(2), 2021.
Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samadjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, Christine van Vredendaal. "Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber", IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021:88-113, 2021.
Matthias J. Kannwischer, Peter Pessl, Robert Primas. "Single-Trace Attack on Keccak", IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020:243-268, 2020.
Peter Pessl, Robert Primas. "More practical single-trace attacks on the number theoretic transform", LATINCRYPT, volume 11774 of Lecture Notes in Computer Science, pp 130-149. Springer, 2019.
Peter Pessl, Lukas Prokop. "Fault attacks on CCA-secure lattice KEMs", IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021:37-60, 2021
Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadyay. "On exploiting message leakage in (few) NIST PQC candidates for practical message recovery and key recovery attacks", IACR ePrint archive: Report 2020/1159, 2020. https://eprint.iacr.org/2020/1559.
Prasanna Ravi, Sujoy Sinha Roy, Anupam Chattopadhyay, Shivam Bhasin. "Generic Side-Channel attacks on CCA-secure lattice-based PKE and KEMs", IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020:307-335, 2020.
Rei Ueno, Keita Xagawa, Yutaro Tanaka, Akira Ito, Junko Takahashi, Naofumi Homma. "Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs", IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022:296-322, 2022.
Robert Primas, Peter Pessl, Stefan Mangard. "Single-trace side-channel attacks on masked lattice-based encryption", In International Conference on Cryptographic Hardware and Embedded Systems, volume 10529 of Lecture Notes in Computer Science, pp. 513-553. Springer, 2017
Shivam Bhasin, Jan-Pieter D'Anvers, Daniel Heinz et al. "Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography", IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021:334-359, 2021.
ThomasSchamberger, OliverMischke, JohannaSepulveda. "Practical Evaluation of Masking for NTRUEncrypt on ARM Cortex-M4." "Constructive Side-Channel Analysis and Secure Design." Springer: 2019. 253-269.
Tobias Oder, Tobias Schneider, Thomas Poppelmann, Tim Guneysu. "Practical CCA2-secure masked Ring-LWE implementations", IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018:142-174, 2018.
WangAn, WangCe, ZhengXuexin, TianWeina, XuRixin, ZhangGuoshuang. "Random key rotation: Side-channel countermeasure of NTRU." "Computers & Electrical Engineering." ELSEVIER: 2017. 220-231.
Zheng, Xuexin , An Wang, and Wei Wei. First-order collision attack on protected NTRU cryptosystem. 6-7. Vol. 37. Microprocessors and Microsystems: 2013.
Zhuang Xu, Owen Pemberton, Sujoy Sinha Roy, David Oswald. "Magnifying side-channel leakage of lattice-based cryptosystems with chosen ciphertexts: The case study of Kyber", IACR ePrint archive: Report 2020/912, 2020. https://eprint.iacr.org/2020/912.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.