Chou suggested a constant-time implementation for quasi-cyclic moderatedensity parity-check (QC-MDPC) code-based cryptography to mitigate timing attacks at CHES 2016. This countermeasure was later found to become vulnerable to a differential power analysis (DPA) in private syndrome computation, as described by Rossi et al. at CHES 2017. The proposed DPA, however, still could not completely recover accurate secret indices, requiring further solving linear equations to obtain entire secret information. In this paper, we propose a multiple-trace attack which enables to completely recover accurate secret indices. We further propose a singletrace attack which can even work when using ephemeral keys or applying Rossi et al.’s DPA countermeasures....
The lattice-based cryptography problems are known to be secure against the quantum computing attacks...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention ...
Differential Power Analysis (DPA) attacks extract the secret key of cryptographic algorithm, by anal...
QcBits is a code-based public key algorithm based on a problem thought to be resistant to quantum co...
In 2013, Misoczki, Tillich, Sendrier and Barreto proposed a variant of the McEliece cryptosystem bas...
In this paper we study reaction and timing attacks against cryptosystems based on sparse parity-chec...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
International audienceThe segment of post-quantum cryptography rises its importance with increasing ...
This paper describes the first practical single-trace side-channel power analysis of SIKE. While SIK...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention ...
Abstract—Nowadays, differential power-analysis (DPA) attacks are a serious threat for cryptographic ...
International audienceROLLO, for Rank-Ouroboros, LAKE and LOCKER, was a candidate to the second roun...
International audienceIn this paper, we present a single-trace attack on a BIKE Cortex-M4 implementa...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
Differential Power Analysis (DPA) attacks extract the secret key of cryptographic algorithm, by anal...
The lattice-based cryptography problems are known to be secure against the quantum computing attacks...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention ...
Differential Power Analysis (DPA) attacks extract the secret key of cryptographic algorithm, by anal...
QcBits is a code-based public key algorithm based on a problem thought to be resistant to quantum co...
In 2013, Misoczki, Tillich, Sendrier and Barreto proposed a variant of the McEliece cryptosystem bas...
In this paper we study reaction and timing attacks against cryptosystems based on sparse parity-chec...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
International audienceThe segment of post-quantum cryptography rises its importance with increasing ...
This paper describes the first practical single-trace side-channel power analysis of SIKE. While SIK...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention ...
Abstract—Nowadays, differential power-analysis (DPA) attacks are a serious threat for cryptographic ...
International audienceROLLO, for Rank-Ouroboros, LAKE and LOCKER, was a candidate to the second roun...
International audienceIn this paper, we present a single-trace attack on a BIKE Cortex-M4 implementa...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
Differential Power Analysis (DPA) attacks extract the secret key of cryptographic algorithm, by anal...
The lattice-based cryptography problems are known to be secure against the quantum computing attacks...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention ...
Differential Power Analysis (DPA) attacks extract the secret key of cryptographic algorithm, by anal...