A new key recovery side-channel attack on HQC with chosen ciphertext
DOI10.1007/978-3-031-17234-2_17zbMATH Open1517.94105MaRDI QIDQ6166993FDOQ6166993
Authors: Guillaume Goy, Antoine Loiseau, Philippe Gaborit
Publication date: 7 July 2023
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Full work available at URL: https://hal-cea.archives-ouvertes.fr/cea-03823234/file/PQcrypto22_GOYG.pdf
Recommendations
- A power side-channel attack on the Reed-Muller Reed-Solomon version of the HQC cryptosystem
- A new decryption failure attack against HQC
- A practicable timing attack against HQC and its countermeasure
- A timing attack on the HQC encryption scheme
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
Cryptography (94A60) Linear codes (general theory) (94B05) Quantum cryptography (quantum-theoretic aspects) (81P94) Channel models (including quantum) in information and communication theory (94A40)
Cites Work
- Scikit-learn: machine learning in Python
- A method for obtaining digital signatures and public-key cryptosystems
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Title not available (Why is that?)
- Title not available (Why is that?)
- Secure integration of asymmetric and symmetric encryption schemes
- On the inherent intractability of certain coding problems (Corresp.)
- Secure integration of asymmetric and symmetric encryption schemes
- Decoding one out of many
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Title not available (Why is that?)
- A timing attack on the HQC encryption scheme
- A modular analysis of the Fujisaki-Okamoto transformation
- A practicable timing attack against HQC and its countermeasure
Cited In (15)
- A side-channel assisted cryptanalytic attack against \textsf{QcBits}
- A power side-channel attack on the Reed-Muller Reed-Solomon version of the HQC cryptosystem
- SCA-LDPC: a code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes
- Punctured syndrome decoding problem. Efficient side-channel attacks against \textit{Classic McEliece}
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
- A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial
- A new decryption failure attack against HQC
- Key-recovery fault injection attack on the classic McEliece KEM
- A side-channel secret key recovery attack on CRYSTALS-Kyber using \(k\) chosen ciphertexts
- A practicable timing attack against HQC and its countermeasure
- A timing attack on the HQC encryption scheme
- Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project
- BIKE key-recovery: combining power consumption analysis and information-set decoding
- Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4
- Exploiting ROLLO's constant-time implementations with a single-trace analysis
This page was built for publication: A new key recovery side-channel attack on HQC with chosen ciphertext
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6166993)