@article{Coron_Gérard_Montoya_Zeitoun_2022, title={High-order Polynomial Comparison and Masking Lattice-based Encryption}, volume={2023}, url={https://tches.iacr.org/index.php/TCHES/article/view/9950}, DOI={10.46586/tches.v2023.i1.153-192}, abstractNote={<p>The main protection against side-channel attacks consists in computing every function with multiple shares via the masking countermeasure. For IND-CCA secure lattice-based encryption schemes, the masking of the decryption algorithm requires the high-order computation of a polynomial comparison. In this paper, we describe and evaluate a number of different techniques for such high-order comparison, always with a security proof in the ISW probing model. As an application, we describe the full high-order masking of the NIST standard Kyber, with a concrete implementation on ARM Cortex M architecture, and a <em>t</em>-test evaluation.</p>}, number={1}, journal={IACR Transactions on Cryptographic Hardware and Embedded Systems}, author={Coron, Jean-Sébastien and Gérard, François and Montoya, Simon and Zeitoun, Rina}, year={2022}, month={Nov.}, pages={153–192} }