SCA-LDPC: a code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes
DOI10.1007/978-981-99-8730-6_7zbMATH Open1547.94372MaRDI QIDQ6604875FDOQ6604875
Authors: Qian Guo, Denis Nabokov, Alexander Nilsson, Thomas Johansson
Publication date: 13 September 2024
Recommendations
- A new key recovery side-channel attack on HQC with chosen ciphertext
- A key recovery attack on MDPC with CCA security using decoding errors
- Punctured syndrome decoding problem. Efficient side-channel attacks against \textit{Classic McEliece}
- Systematic study of decryption and re-encryption leakage: the case of Kyber
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
code-based cryptographylattice-based cryptographyside-channel attackslow-density parity-check codesNIST post-quantum cryptography standardization
Cryptography (94A60) Quantum cryptography (quantum-theoretic aspects) (81P94) Channel models (including quantum) in information and communication theory (94A40)
Cites Work
- On lattices, learning with errors, random linear codes, and cryptography
- Title not available (Why is that?)
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Secure integration of asymmetric and symmetric encryption schemes
- Design of capacity-approaching irregular low-density parity-check codes
- Modern Coding Theory
- A modular analysis of the Fujisaki-Okamoto transformation
- LWE with side information: attacks and concrete security estimation
- A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
- A key recovery attack on MDPC with CCA security using decoding errors
- Soft analytical side-channel attacks
- Single-trace side-channel attacks on masked lattice-based encryption
- A simple one-sweep algorithm for optimal APP symbol decoding of linear block codes
- Reverend Bayes on Inference Engines: A Distributed Hierarchical Approach
- A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
- A power side-channel attack on the Reed-Muller Reed-Solomon version of the HQC cryptosystem
- A new key recovery side-channel attack on HQC with chosen ciphertext
This page was built for publication: SCA-LDPC: a code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6604875)