In the last few years, post-quantum cryptography has received much attention. NIST is running a competition to select some post-quantum schemes as standard. As a consequence, implementations of post-quantum schemes have become important and with them side-channel attacks. In this paper, we show a timing attack on a code-based scheme which was submitted to the NIST competition. This timing attack recovers secret information because of a timing variance in finding roots in a polynomial. We present four algorithms to find roots that are protected against remote timing exploitation
When the running time of a cryptographic algorithm is non-constant, timing measurements can leak inf...
International audienceThis paper presents a general strategy to recover a block cipher secret key in...
In 2012, Guedes, Assis, and Lula proposed a quantum attack on a pseudorandom number generator named ...
In the last few years, post-quantum cryptography has received much attention. NIST is running a comp...
In the last few years, post-quantum cryptography has received much attention. NIST is running a comp...
In the last few years, post-quantum cryptography has received much attention. NIST is running a comp...
Well before large-scale quantum computers will be available, traditional cryptosystems must be trans...
In the implementation of post-quantum primitives, it is well known that all computations that handle...
Post-quantum cryptosystems have currently seen a surge in interest thanks to the current standardiza...
Modern cryptographic algorithms such as AES and RSA are effectively used for securing data transmiss...
We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, an...
International audienceIn this paper, we report the first quantum key-recovery attack on a symmetric ...
We investigate side-channel attacks where the attacker only needs the Hamming weights of several sec...
This thesis studies efficiency and security problems of implementations of code-based cryptosystems....
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
When the running time of a cryptographic algorithm is non-constant, timing measurements can leak inf...
International audienceThis paper presents a general strategy to recover a block cipher secret key in...
In 2012, Guedes, Assis, and Lula proposed a quantum attack on a pseudorandom number generator named ...
In the last few years, post-quantum cryptography has received much attention. NIST is running a comp...
In the last few years, post-quantum cryptography has received much attention. NIST is running a comp...
In the last few years, post-quantum cryptography has received much attention. NIST is running a comp...
Well before large-scale quantum computers will be available, traditional cryptosystems must be trans...
In the implementation of post-quantum primitives, it is well known that all computations that handle...
Post-quantum cryptosystems have currently seen a surge in interest thanks to the current standardiza...
Modern cryptographic algorithms such as AES and RSA are effectively used for securing data transmiss...
We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, an...
International audienceIn this paper, we report the first quantum key-recovery attack on a symmetric ...
We investigate side-channel attacks where the attacker only needs the Hamming weights of several sec...
This thesis studies efficiency and security problems of implementations of code-based cryptosystems....
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
When the running time of a cryptographic algorithm is non-constant, timing measurements can leak inf...
International audienceThis paper presents a general strategy to recover a block cipher secret key in...
In 2012, Guedes, Assis, and Lula proposed a quantum attack on a pseudorandom number generator named ...