2016
DOI: 10.1145/2930664
|View full text |Cite
|
Sign up to set email alerts
|

Fault Detection Architectures for Post-Quantum Cryptographic Stateless Hash-Based Secure Signatures Benchmarked on ASIC

Abstract: Symmetric-key cryptography can resist the potential post-quantum attacks expected with the not-so-faraway advent of quantum computing power. Hash-based, code-based, lattice-based, and multivariate-quadratic equations are all other potential candidates, the merit of which is that they are believed to resist both classical and quantum computers, and applying “Shor’s algorithm”—the quantum-computer discrete-logarithm algorithm that breaks classical schemes—to them is infeasible. In this article, we propose, asses… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(8 citation statements)
references
References 37 publications
0
8
0
Order By: Relevance
“…BLAKE is one of the fastest hash algorithms and has strong security [50,58]. Recent research has pointed out that BLAKE is a suitable algorithm for source limited devices [59,60]. • De-identification mechanism…”
Section: -Blake Familymentioning
confidence: 99%
“…BLAKE is one of the fastest hash algorithms and has strong security [50,58]. Recent research has pointed out that BLAKE is a suitable algorithm for source limited devices [59,60]. • De-identification mechanism…”
Section: -Blake Familymentioning
confidence: 99%
“…Although quantum cryptography is not widely found and deployed in real-world applications (at the time of writing), the research community has already started studying post-quantum cryptography [Broadbent and Schaffner 2016;. In this special section, for example, Mozaffari-Kermani et al [2016] noted that hash-, code-, and lattice-based solutions, as well as multivariate-quadratic-equations could potentially resist cryptanalysis efforts from pre-quantum and quantum computing devices. The authors then propose and evaluate fault diagnosis approaches for hash-based post-quantum signatures.…”
Section: Cryptographic Solutions and Attacksmentioning
confidence: 99%
“…In the work of [CMP18] by Castelnovi, Martinelli, and Prest, the authors failed to find a specific countermeasure and recommend classical redundancy instead. The work by Mozaffari Kermani, Azarderakhsh, and Aghaie in [KAA17] proposes specific error-detection mechanisms in hash function implementations which therefore do not entirely cover the SPHINCS + signing procedure, as well as a generic countermeasure based on recomputing hash trees with swapped nodes (i.e., also redundancy). In [GKPM18], Genêt et al show that caching the one-time signatures of the hash trees in stateful hash-based signature schemes effectively protects against similar fault-based forgeries.…”
Section: Introductionmentioning
confidence: 99%