Algorithmic security is insufficient: A comprehensive survey on implementation attacks haunting post-quantum security
This survey is on forward-looking, emerging security concerns in post-quantum era, ie, the
implementation attacks for 2022 winners of NIST post-quantum cryptography (PQC) …
implementation attacks for 2022 winners of NIST post-quantum cryptography (PQC) …
A survey of timing channels and countermeasures
A timing channel is a communication channel that can transfer information to a
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …
A survey on code-based cryptography
V Weger, N Gassner, J Rosenthal - arXiv preprint arXiv:2201.07119, 2022 - arxiv.org
The improvements on quantum technology are threatening our daily cybersecurity, as a
capable quantum computer can break all currently employed asymmetric cryptosystems. In …
capable quantum computer can break all currently employed asymmetric cryptosystems. In …
QC-MDPC: a timing attack and a CCA2 KEM
Abstract In 2013, Misoczki, Tillich, Sendrier and Barreto proposed a variant of the McEliece
cryptosystem based on quasi-cyclic moderate-density parity-check (QC-MDPC) codes. This …
cryptosystem based on quasi-cyclic moderate-density parity-check (QC-MDPC) codes. This …
Reliable constructions for the key generator of code-based post-quantum cryptosystems on FPGA
Advances in quantum computing have urged the need for cryptographic algorithms that are
low-power, low-energy, and secure against attacks that can be potentially enabled. For this …
low-power, low-energy, and secure against attacks that can be potentially enabled. For this …
MicroEliece: McEliece for embedded devices
Most advanced security systems rely on public-key schemes based either on the
factorization or the discrete logarithm problem. Since both problems are known to be closely …
factorization or the discrete logarithm problem. Since both problems are known to be closely …
A timing attack against the secret permutation in the McEliece PKC
F Strenzke - … Workshop, PQCrypto 2010, Darmstadt, Germany, May …, 2010 - Springer
In this work we present a novel timing attack against the McEliece public key cryptosystem
(PKC). In contrast to former works investigating timing attacks that aim at recovering the …
(PKC). In contrast to former works investigating timing attacks that aim at recovering the …
A timing attack against Patterson algorithm in the McEliece PKC
The security of McEliece public-key cryptosystem is based on the difficulty of the decoding
problem which is NP-hard. In this paper we propose a timing attack on the Patterson …
problem which is NP-hard. In this paper we propose a timing attack on the Patterson …
A Side-Channel Assisted Cryptanalytic Attack Against QcBits
QcBits is a code-based public key algorithm based on a problem thought to be resistant to
quantum computer attacks. It is a constant-time implementation for a quasi-cyclic moderate …
quantum computer attacks. It is a constant-time implementation for a quasi-cyclic moderate …
Information-set decoding with hints
This paper studies how to incorporate small information leakages (called “hints”) into
information-set decoding (ISD) algorithms. In particular, the influence of these hints on …
information-set decoding (ISD) algorithms. In particular, the influence of these hints on …