In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM finalist in the NIST Post-quantum Cryptography Standardization Project. Our novel idea is to design an attack algorithm where we submit special ciphertexts to the decryption oracle that correspond to cases of single errors. Decoding of such ciphertexts involves only a single entry in a large secret permutation, which is part of the secret key. Through an identified leakage in the additive FFT step used to evaluate the error locator polynomial, a single entry of the secret permutation can be determined. Iterating this for other entries leads to full secret key recovery. The attack is described using power analysis both on the FPGA reference implem...
International audience—In this paper, based on a thorough analysis of the state of the art, we point...
Instantiations of the McEliece cryptosystem which are considered computationally secure even in a po...
The McEliece public key cryptosystem (PKC) is regarded as secure in the presence of quantum computer...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
We present a key-recovery fault injection attack on the Classic McEliece Key Encapsulation Mechanism...
This paper presents an attack based on side-channel information and information set decoding on the ...
International audienceThe NIST standardization process for post-quantum cryptography has been drawin...
International audienceThe NIST standardization process for post-quantum cryptography has been drawin...
International audienceThe NIST standardization process for post-quantum cryptography has been drawin...
International audienceThe NIST standardization process for post-quantum cryptography has been drawin...
Abstract. Instantiations of the McEliece cryptosystem which are considered computationally secure ev...
The McEliece cryptosystem is a strong contender for post-quantum schemes, including key encapsulatio...
International audience—In this paper, based on a thorough analysis of the state of the art, we point...
Instantiations of the McEliece cryptosystem which are considered computationally secure even in a po...
The McEliece public key cryptosystem (PKC) is regarded as secure in the presence of quantum computer...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
We present a key-recovery fault injection attack on the Classic McEliece Key Encapsulation Mechanism...
This paper presents an attack based on side-channel information and information set decoding on the ...
International audienceThe NIST standardization process for post-quantum cryptography has been drawin...
International audienceThe NIST standardization process for post-quantum cryptography has been drawin...
International audienceThe NIST standardization process for post-quantum cryptography has been drawin...
International audienceThe NIST standardization process for post-quantum cryptography has been drawin...
Abstract. Instantiations of the McEliece cryptosystem which are considered computationally secure ev...
The McEliece cryptosystem is a strong contender for post-quantum schemes, including key encapsulatio...
International audience—In this paper, based on a thorough analysis of the state of the art, we point...
Instantiations of the McEliece cryptosystem which are considered computationally secure even in a po...
The McEliece public key cryptosystem (PKC) is regarded as secure in the presence of quantum computer...