April 10, 2024, 3:54 p.m. |

IACR News www.iacr.org

ePrint Report: Probabilistic Algorithms with applications to countering Fault Attacks on Lattice based Post-Quantum Cryptography

Nimish Mishra, Debdeep Mukhopadhyay


Fault attacks that exploit the propagation of effective/ineffective faults present a richer attack surface than Differential Fault Attacks, in the sense that the adversary depends on a single bit of information to eventually leak secret cryptographic material. In the recent past, a number of propagation-based fault attacks on Lattice-based Key Encapsulation Mechanisms have been proposed; many of which have no known …

adversary algorithms applications attack attacks attack surface cryptography eprint report exploit post-quantum post-quantum cryptography quantum quantum cryptography report single

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)