Secret Key Recovery Attack on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber.
Linus BacklundKalle NgoJoel GärtnerElena DubrovaPublished in: ACNS Workshops (2023)
Keyphrases
- secret key
- smart card
- authentication scheme
- secure communication
- public key
- pseudorandom
- key management
- stream cipher
- key agreement
- secret data
- hash functions
- key distribution
- encryption scheme
- security level
- authentication protocol
- efficient implementation
- encryption decryption
- ciphertext
- block cipher
- diffie hellman
- real time
- signature scheme
- security analysis
- session key