Publication:

Side-channel Analysis of Lattice-based Post-quantum Cryptography: Exploiting Polynomial Multiplication

Date

 
dc.contributor.authorMujdei, Catinca
dc.contributor.authorWouters, Lennert
dc.contributor.authorKarmakar, Angshuman
dc.contributor.authorBeckers, Arthur
dc.contributor.authorMera, Jose Maria Bermudo
dc.contributor.authorVerbauwhede, Ingrid
dc.date.accessioned2024-09-30T10:28:25Z
dc.date.available2024-05-10T18:24:58Z
dc.date.available2024-09-30T10:28:25Z
dc.date.embargo2024-03-27
dc.date.issued2024
dc.description.wosFundingTextThis work was supported in part by CyberSecurity Research Flanders with reference number VR20192203, the Research Council KU Leuven (C16/15/058), the Horizon 2020 ERC Advanced Grant (101020005 Belfort) and SRC grant 2909.001. This work was supported in part by the Research Council KU Leuven grant C14/18/067 on Cryptanalysis of post-quantum cryptography. Angshuman Karmakar is funded by FWO (Research Foundation -Flanders) as junior post-doctoral fellow (contract number: 203056/1241722N LV).
dc.identifier.doi10.1145/3569420
dc.identifier.issn1539-9087
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/43919
dc.publisherASSOC COMPUTING MACHINERY
dc.source.beginpageArt. 27
dc.source.endpageN/A
dc.source.issue2
dc.source.journalACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS
dc.source.numberofpages23
dc.source.volume23
dc.subject.keywordsATTACKS
dc.subject.keywordsNUMBER
dc.title

Side-channel Analysis of Lattice-based Post-quantum Cryptography: Exploiting Polynomial Multiplication

dc.typeJournal article
dspace.entity.typePublication
Files

Original bundle

Name:
article-3488.pdf
Size:
1.15 MB
Format:
Adobe Portable Document Format
Description:
Accepted version
Publication available in collections: