no code implementations • 13 Mar 2024 • Harshit Saurabh, Anupam Golder, Samarth Shivakumar Titti, Suparna Kundu, Chaoyun Li, Angshuman Karmakar, Debayan Das
Overall, using the \textit{combined CPA and LDA attack} model, the correct secret key byte is recovered with <50 traces collected using the ChipWhisperer platform.
1 code implementation • IEEE Transactions on Circuits and Systems I: Regular Papers 2022 • Wai-Kong Lee, Hwajeong Seo, Seong Oun Hwang, Angshuman Karmakar, Jose Maria Bermudo Mera, Ramachandra Achar
This paper also presents the first implementation of Saber on GPU platforms, achieving 124, 418, 120, 463, and 31, 658 key exchange operations per second on RTX3080, V100, and T4 GPUs, respectively.
Cryptography and Security