Fault Attacks on CCA-Secure Lattice KEMs

Fault Attacks on CCA-Secure Lattice KEMs

TheIACR via YouTube Direct link

Gathering Inequalities

15 of 18

15 of 18

Gathering Inequalities

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Fault Attacks on CCA-Secure Lattice KEMs

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What's that all about?
  3. 3 Status: Implementation Security of Lattice KEM
  4. 4 Kyber, Saber: High-Level Similarities
  5. 5 Our Attack
  6. 6 The LPR Encryption Scheme: Noisy ElGamal
  7. 7 Correctness and Decoding
  8. 8 Fujisaki-Okamoto: CPA PKE
  9. 9 Attacking an FO-KEM
  10. 10 Effective vs. Inflective Faults
  11. 11 (In)Effective Faults in the Decoder
  12. 12 Kyber's Decoding Routine
  13. 13 Faulting the Decoder
  14. 14 Extracting Information
  15. 15 Gathering Inequalities
  16. 16 Solving for the key
  17. 17 Solving Approach
  18. 18 Countermeasures?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.