Cold Boot Attacks on Ring and Module LWE Keys Under the NTT
- Submitting institution
-
Royal Holloway and Bedford New College
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 35276380
- Type
- D - Journal article
- DOI
-
10.13154/tches.v2018.i3.173-213
- Title of journal
- IACR Transactions on Cryptographic Hardware and Embedded Systems
- Article number
- -
- First page
- 173
- Volume
- 2018
- Issue
- 3
- ISSN
- 2569-2925
- Open access status
- Compliant
- Month of publication
- August
- Year of publication
- 2018
- URL
-
-
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
2
- Research group(s)
-
-
- Citation count
- -
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- This work demonstrated that the choice of how to store the secret key of a lattice-based encryption scheme in RAM influences how vulnerable the scheme in question is to cold-boot attacks where an attacker extracts a noisy copy of the secret key from RAM. The work proposes algorithms for the computational problems implied by this observation and demonstrated good performance for some realistic parameter sets. The paper won the best-paper award at CHES'18.
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -