Overview
Explore the world of post-quantum cryptography in this comprehensive lecture, focusing on the first part of a series. Delve into topics such as masking techniques, the Kyber encryption scheme, and its security features. Learn about attacking and defending masked polynomials, as well as fault attacks on lattice schemes. Gain insights into the analysis of table-based arithmetic to boolean masking. Conclude with a Q&A session to reinforce your understanding of these cutting-edge cryptographic concepts.
Syllabus
Intro
Presentation
Masking Kyber
Secure Kyber
Attacking and defending masked polynomials
Fault attacks on lattice schemes
Analysis of tablebased arithmetic to boolean masking
QA
Taught by
TheIACR