Skip to main content
Top

Runtime Code Generation for Constant-Time Secret-Indexed Array Accesses: Applications to PERK and NTRU

  • 2026
  • OriginalPaper
  • Chapter
Published in:

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter introduces a groundbreaking method for secure cryptographic implementations by utilizing runtime code generation to achieve constant-time array accesses. The approach effectively eliminates vulnerabilities to side-channel attacks, which exploit physical information leaked during cryptographic operations. By leveraging the CPU’s register file as temporary storage for arrays, the method ensures that memory accesses do not leak sensitive information through cache-based side-channel attacks. The chapter demonstrates the application of this technique to various cryptographic operations, including permutation sampling, composition, and inversion, which are crucial in post-quantum schemes like PERK and NTRU. Performance results show significant improvements over existing constant-time alternatives, making this method a promising solution for enhancing both the security and efficiency of cryptographic implementations. The chapter also discusses the limitations and potential issues of the technique, encouraging further research to assess and develop workarounds. Overall, this innovative approach offers a robust solution for securing cryptographic implementations against side-channel attacks, providing a valuable resource for professionals in the field.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Business + Economics & Engineering + Technology"

Online-Abonnement

Springer Professional "Business + Economics & Engineering + Technology" gives you access to:

  • more than 102.000 books
  • more than 537 journals

from the following subject areas:

  • Automotive
  • Construction + Real Estate
  • Business IT + Informatics
  • Electrical Engineering + Electronics
  • Energy + Sustainability
  • Finance + Banking
  • Management + Leadership
  • Marketing + Sales
  • Mechanical Engineering + Materials
  • Insurance + Risk


Secure your knowledge advantage now!

Springer Professional "Engineering + Technology"

Online-Abonnement

Springer Professional "Engineering + Technology" gives you access to:

  • more than 67.000 books
  • more than 390 journals

from the following specialised fileds:

  • Automotive
  • Business IT + Informatics
  • Construction + Real Estate
  • Electrical Engineering + Electronics
  • Energy + Sustainability
  • Mechanical Engineering + Materials





 

Secure your knowledge advantage now!

Springer Professional "Business + Economics"

Online-Abonnement

Springer Professional "Business + Economics" gives you access to:

  • more than 67.000 books
  • more than 340 journals

from the following specialised fileds:

  • Construction + Real Estate
  • Business IT + Informatics
  • Finance + Banking
  • Management + Leadership
  • Marketing + Sales
  • Insurance + Risk



Secure your knowledge advantage now!

Title
Runtime Code Generation for Constant-Time Secret-Indexed Array Accesses: Applications to PERK and NTRU
Authors
Décio Luiz Gazzoni Filho
Rafael G. Flores e Silva
Alessandro Budroni
Marco Palumbi
Gora Adj
Copyright Year
2026
DOI
https://doi.org/10.1007/978-3-032-06754-8_17
This content is only visible if you are logged in and have the appropriate permissions.
This content is only visible if you are logged in and have the appropriate permissions.
This content is only visible if you are logged in and have the appropriate permissions.

Premium Partner

    Image Credits
    Neuer Inhalt/© ITandMEDIA, Nagarro GmbH/© Nagarro GmbH, AvePoint Deutschland GmbH/© AvePoint Deutschland GmbH, AFB Gemeinnützige GmbH/© AFB Gemeinnützige GmbH, USU GmbH/© USU GmbH