A new key recovery side-channel attack on HQC with chosen ciphertext
From MaRDI portal
Publication:6166993
Recommendations
- A power side-channel attack on the Reed-Muller Reed-Solomon version of the HQC cryptosystem
- A new decryption failure attack against HQC
- A practicable timing attack against HQC and its countermeasure
- A timing attack on the HQC encryption scheme
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
Cites work
- scientific article; zbMATH DE number 3577144 (Why is no real title available?)
- scientific article; zbMATH DE number 1882022 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A method for obtaining digital signatures and public-key cryptosystems
- A modular analysis of the Fujisaki-Okamoto transformation
- A practicable timing attack against HQC and its countermeasure
- A timing attack on the HQC encryption scheme
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Decoding one out of many
- On the inherent intractability of certain coding problems (Corresp.)
- Scikit-learn: machine learning in Python
- Secure integration of asymmetric and symmetric encryption schemes
- Secure integration of asymmetric and symmetric encryption schemes
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
Cited in
(15)- A power side-channel attack on the Reed-Muller Reed-Solomon version of the HQC cryptosystem
- A practicable timing attack against HQC and its countermeasure
- A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial
- A timing attack on the HQC encryption scheme
- SCA-LDPC: a code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes
- A new decryption failure attack against HQC
- Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project
- Key-recovery fault injection attack on the classic McEliece KEM
- A side-channel assisted cryptanalytic attack against \textsf{QcBits}
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
- Punctured syndrome decoding problem. Efficient side-channel attacks against \textit{Classic McEliece}
- Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4
- A side-channel secret key recovery attack on CRYSTALS-Kyber using \(k\) chosen ciphertexts
- Exploiting ROLLO's constant-time implementations with a single-trace analysis
- BIKE key-recovery: combining power consumption analysis and information-set decoding
This page was built for publication: A new key recovery side-channel attack on HQC with chosen ciphertext
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6166993)