Exploiting ROLLO's constant-time implementations with a single-trace analysis
From MaRDI portal
Publication:6130605
DOI10.1007/s10623-023-01227-3MaRDI QIDQ6130605
Lina Mortajine, Nadia El Mrabet, Tania Richmond, Agathe Cheriere
Publication date: 3 April 2024
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Cryptography (94A60) Theory of error-correcting codes and error-detecting codes (94B99) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Unnamed Item
- An algebraic attack on rank metric code-based cryptosystems
- Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem
- A reaction attack against cryptosystems based on LRPC codes
- Improvements of algebraic attacks for solving the rank decoding and MinRank problems
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
- McBits: Fast Constant-Time Code-Based Cryptography
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Side Channels in the McEliece PKC
- A method for obtaining digital signatures and public-key cryptosystems
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer