2023
DOI: 10.1109/tcsi.2023.3288600
|View full text |Cite
|
Sign up to set email alerts
|

Side Channel Security Oriented Evaluation and Protection on Hardware Implementations of Kyber

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…The identification of sidechannel attack vulnerabilities by recent research has prompted the investigation of solutions to reduce the associated dangers. Power side-channel information has been exploited, and encryption keys have been extracted from Kyber implementations using machine learning techniques [48]. Researchers have suggested recursive learning techniques and disguised implementations to counter these dangers and improve security against side-channel attacks.…”
Section: State Of the Art Implementation Of Kybermentioning
confidence: 99%
“…The identification of sidechannel attack vulnerabilities by recent research has prompted the investigation of solutions to reduce the associated dangers. Power side-channel information has been exploited, and encryption keys have been extracted from Kyber implementations using machine learning techniques [48]. Researchers have suggested recursive learning techniques and disguised implementations to counter these dangers and improve security against side-channel attacks.…”
Section: State Of the Art Implementation Of Kybermentioning
confidence: 99%