2022
DOI: 10.46586/tches.v2022.i4.285-310
|View full text |Cite
|
Sign up to set email alerts
|

Single-Trace Side-Channel Attacks on the Toom-Cook: The Case Study of Saber

Abstract: The Toom-Cook method is a well-known strategy for building algorithms to multiply polynomials efficiently. Along with NTT-based polynomial multiplication, Toom-Cook-based or Karatsuba-based polynomial multiplication algorithms still have regained attention since the start of the NIST’s post-quantum standardization procedure. Compared to the comprehensive analysis done for NTT, the leakage characteristics of Toom-Cook have not been discussed. We analyze the vulnerabilities of Toom-Cook in the reference implemen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…Later, in Marco Bodrato's advanced research in [6], several strategies TABLE 1: Toom based multiplication related research. We extracted information from [4]- [8], [12], [13] and [11] to elucidate on their particular Toom-Cook-based-related task in a classical-quantum environment. and techniques for achieving a high degree of precision in the implementation of Toom-Cook algorithms, specifically for both balanced and unbalanced scenarios, are clarified in classical hardware implementation.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Later, in Marco Bodrato's advanced research in [6], several strategies TABLE 1: Toom based multiplication related research. We extracted information from [4]- [8], [12], [13] and [11] to elucidate on their particular Toom-Cook-based-related task in a classical-quantum environment. and techniques for achieving a high degree of precision in the implementation of Toom-Cook algorithms, specifically for both balanced and unbalanced scenarios, are clarified in classical hardware implementation.…”
Section: Related Workmentioning
confidence: 99%
“…There has been a significant surge in the adoption of Toom-Cook and number theoretic transform (NTT)-based polynomial multiplication as a result of their incorporation as essential elements in the post-quantum standardization initiative [3], [4]. In addition to classical and quantum multiplication designs, i.e., [5], [6], [7], [8], several studies [3], [4], [9] have put forth an interesting investigation concerning Toom-Cook multiplication. The current investigation, which reveals the vulnerabilities of the Toom-Cook multiplication algorithm, was carried out by [4], [10].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations