Impact
This project sets out to identify secure parameter sets, relevant attack vectors for side-channel analyses, and secure implementations for asymmetric cryptographic schemes in a post-quantum setting:
- On the algorithmic side, we want to identify cryptographic schemes and secure parameters, offering strong (provable) guarantees against quantum algorithms. At the same time, the performance is to be competitive with deployed solutions.
- On the cryptanalytic side, our objective is to identify plausible attack vectors and methods against implementations of a post-quantum cryptographic scheme, and to empirically demonstrate side-channel attacks against implementations in software and hardware.
- On the implementation side, our objective is to provide secure implementations of a post-quantum cryptographic scheme that can withstand common side-channel attacks. This includes both software and hardware.