April 10, 2024, 3:54 p.m. |

IACR News www.iacr.org

ePrint Report: Probabilistic Algorithms with applications to countering Fault Attacks on Lattice based Post-Quantum Cryptography

Nimish Mishra, Debdeep Mukhopadhyay


Fault attacks that exploit the propagation of effective/ineffective faults present a richer attack surface than Differential Fault Attacks, in the sense that the adversary depends on a single bit of information to eventually leak secret cryptographic material. In the recent past, a number of propagation-based fault attacks on Lattice-based Key Encapsulation Mechanisms have been proposed; many of which have no known …

adversary algorithms applications attack attacks attack surface cryptography eprint report exploit post-quantum post-quantum cryptography quantum quantum cryptography report single

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Premium Hub - CoE: Business Process Senior Consultant, SAP Security Role and Authorisations & GRC

@ SAP | Dublin 24, IE, D24WA02

Product Security Response Engineer

@ Intel | CRI - Belen, Heredia

Application Security Architect

@ Uni Systems | Brussels, Brussels, Belgium

Sr Product Security Engineer

@ ServiceNow | Hyderabad, India

Analyst, Cybersecurity & Technology (Initial Application Deadline May 20th, Final Deadline May 31st)

@ FiscalNote | United Kingdom (UK)