A practicable timing attack against HQC and its countermeasure
From MaRDI portal
Publication:2158241
DOI10.3934/AMC.2020126zbMATH Open1497.94122OpenAlexW3112652840MaRDI QIDQ2158241FDOQ2158241
Authors: Guillaume Wafo-Tapa, Slim Bettaieb, Loïc Bidoux, Philippe Gaborit, Etienne Marcatel
Publication date: 26 July 2022
Published in: Advances in Mathematics of Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.3934/amc.2020126
Recommendations
Cites Work
- Title not available (Why is that?)
- On a class of error correcting binary group codes
- McBits: fast constant-time code-based cryptography
- Theory of codes with maximum rank distance
- Error control coding. Fundamentals and applications
- Additive Fast Fourier Transforms Over Finite Fields
- A modular analysis of the Fujisaki-Okamoto transformation
- The impact of error dependencies on Ring/Mod-LWE/LWR based schemes
- Efficient Encryption From Random Quasi-Cyclic Codes
- Preventing timing attacks against RQC using constant time decoding of Gabidulin codes
- McBits revisited
Cited In (15)
- A side-channel assisted cryptanalytic attack against \textsf{QcBits}
- A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
- A timing attack against the secret permutation in the McEliece PKC
- A power side-channel attack on the Reed-Muller Reed-Solomon version of the HQC cryptosystem
- A new key recovery side-channel attack on HQC with chosen ciphertext
- QC-MDPC: a timing attack and a CCA2 KEM
- McBits: fast constant-time code-based cryptography
- S-semantics -- an example
- A new decryption failure attack against HQC
- Preventing timing attacks against RQC using constant time decoding of Gabidulin codes
- Information-set decoding with hints
- Don't forget your roots: constant-time root finding over \(\mathbb{F}_{2^m}\)
- A timing attack on the HQC encryption scheme
- Cache-timing attack detection and prevention. Application to crypto libs and PQC
- Timing attacks against the syndrome inversion in code-based cryptosystems
This page was built for publication: A practicable timing attack against HQC and its countermeasure
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2158241)