A timing attack on the HQC encryption scheme
From MaRDI portal
Publication:778956
DOI10.1007/978-3-030-38471-5_22zbMATH Open1457.94171OpenAlexW3000724687MaRDI QIDQ778956FDOQ778956
Authors: Thales Bandiera Paiva, Routo Terada
Publication date: 21 July 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-38471-5_22
Recommendations
- A practicable timing attack against HQC and its countermeasure
- A new decryption failure attack against HQC
- A new key recovery side-channel attack on HQC with chosen ciphertext
- Preventing timing attacks against RQC using constant time decoding of Gabidulin codes
- QC-MDPC: a timing attack and a CCA2 KEM
Cited In (14)
- A side-channel assisted cryptanalytic attack against \textsf{QcBits}
- A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
- A power side-channel attack on the Reed-Muller Reed-Solomon version of the HQC cryptosystem
- A new key recovery side-channel attack on HQC with chosen ciphertext
- S-semantics -- an example
- A new decryption failure attack against HQC
- Preventing timing attacks against RQC using constant time decoding of Gabidulin codes
- A practicable timing attack against HQC and its countermeasure
- Information-set decoding with hints
- Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls
- Don't forget your roots: constant-time root finding over \(\mathbb{F}_{2^m}\)
- Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project
- Cache-timing attack detection and prevention. Application to crypto libs and PQC
- Timing attacks against the syndrome inversion in code-based cryptosystems
This page was built for publication: A timing attack on the HQC encryption scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q778956)