|
[1]
|
Shor, P.W. (1999) Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Com-puter. SIAM Review, 41, 303-332. [Google Scholar] [CrossRef]
|
|
[2]
|
Kumar, R. (2019) A Survey on Post-Quantum Cryptography for Constrained Devices. International Journal of Applied Engineering Research, 14, 2608-2615.
|
|
[3]
|
Kim, S. and Hong, S. (2018) Single Trace Analysis on Constant Time CDT Sampler and Its Counter-measure. Applied Sciences, 8, 1809. [Google Scholar] [CrossRef]
|
|
[4]
|
Pessl, P. and Primas, R. (2019) More Practical Single-Trace Attacks on the Number Theoretic Transform. In: Schwabe P. and Thériault, N., Eds., Progress in Cryptology-LATINCRYPT 2019, LATINCRYPT 2019, Lecture Notes in Computer Science, Springer, Cham. [Google Scholar] [CrossRef]
|
|
[5]
|
Huang, W.-L., Chen, J.-P. and Yang, B.-Y. (2020) Power Analysis on NTRU Prime. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 123-151. [Google Scholar] [CrossRef]
|
|
[6]
|
Ravi, P., Roy, S.S., Chattopadhyay, A. and Bhasin, S. (2020) Generic Side-Channel Attacks on CCA-Secure Lattice-Based PKE and KEMS. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 307-335. [Google Scholar] [CrossRef]
|
|
[7]
|
Shen, M., Cheng, C., Zhang, X., Guo, Q. and Jiang, T. (2023) Find the Bad Apples: An Efficient Method for Perfect Key Recovery under Imperfect SCA Oracles—A Case Study of Kyber. IACR Transactions on Cryptographic Hardware and Embed-ded Systems, 2023, 89-112. [Google Scholar] [CrossRef]
|
|
[8]
|
Cagli, E., Dumas, C. and Prouff, E. (2017) Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures. In: Fischer, W. and Homma, N., Eds., Cryptographic Hardware and Embedded Systems-CHES 2017, CHES 2017, Lecture Notes in Computer Science, Springer, Cham. [Google Scholar] [CrossRef]
|
|
[9]
|
Kocher, P.C. (1996) Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N., Ed., Advances in Cryptology-CRYPTO’96, CRYPTO 1996, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg. [Google Scholar] [CrossRef]
|
|
[10]
|
Chari, S., Rao, J.R. and Rohatgi, P. (2003) Template Attacks. In: Kaliski, B.S., Koç, Ç.K., and Paar, C., Eds., Cryptographic Hardware and Embedded Systems-CHES 2002, CHES 2002, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg. [Google Scholar] [CrossRef]
|