2019
DOI: 10.1007/978-3-030-25510-7_4
|View full text |Cite
|
Sign up to set email alerts
|

Towards Practical Microcontroller Implementation of the Signature Scheme Falcon

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 13 publications
0
11
0
Order By: Relevance
“…To the author’s knowledge, some implementations of PQC schemes using the first and fourth approaches [ 18 , 49 , 50 , 51 ], but there is a gap in the literature concerning the second and third approaches. Regarding the third approach, only high-speed implementations are found in the literature [ 48 ], rather than the lightweight implementation targeted by this paper.…”
Section: Methodsmentioning
confidence: 99%
“…To the author’s knowledge, some implementations of PQC schemes using the first and fourth approaches [ 18 , 49 , 50 , 51 ], but there is a gap in the literature concerning the second and third approaches. Regarding the third approach, only high-speed implementations are found in the literature [ 48 ], rather than the lightweight implementation targeted by this paper.…”
Section: Methodsmentioning
confidence: 99%
“…As explained in Section II-C, the main operation of KeyGen and Sign algorithm is the FFT/NTT-based multiplication algorithm. An optimization technique for ffSampling for ARM Cortex-M4 environment was proposed in [13], but this technique aims to reduce memory consumption by approaching the memory layout modification point of view. Unfortunately, as far as we know, performance optimization studies targeting FFT/NTT of the Falcon algorithm do not yet exist.…”
Section: Related Workmentioning
confidence: 99%
“…Aside from the original implementations of DLP and Falcon, which are the focus of this paper, several others have appeared in the literature. However, they usually do not aim for side-channel security [36,41] or only make the base discrete Gaussian sampler (with fixed standard deviation) constant time [29], but do not eliminate the leakage of the varying standard deviations. As a result, those implementations are also vulnerable to the attacks of this paper.…”
Section: Related Workmentioning
confidence: 99%