Exploiting Small-Norm Polynomial Multiplication with Physical Attacks
We present a set of physical profiled attacks against CRYSTALS-Dilithium that accumulate noisy knowledge on secret keys over multiple signatures, finally leading to a full key recovery attack.The methodology is composed of two steps.The first step consists of observing Mastectomy or inserting a bias in the posterior distribution of sensitive variab