A survey of timing channels and countermeasures

AK Biswas, D Ghosal, S Nagaraja - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
A timing channel is a communication channel that can transfer information to a
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …

CRC-oriented error detection architectures of post-quantum cryptography niederreiter key generator on FPGA

A Cintas-Canto, M Mozaffari-Kermani… - 2022 IEEE Nordic …, 2022 - ieeexplore.ieee.org
Providing error detection constructions for Internet of nano-Things in constrained
applications is of prominent importance. The Niederreiter cryptosystem falls into the category …

DVFS frequently leaks secrets: Hertzbleed attacks beyond SIKE, cryptography, and CPU-only data

Y Wang, R Paccagnella, A Wandke… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The recent Hertzbleed disclosure demonstrates how remote-timing analysis can reveal
secret information previously only accessible to local-power analysis. At worst, this …

FPGA-based Niederreiter cryptosystem using binary Goppa codes

W Wang, J Szefer, R Niederhagen - … 2018, Fort Lauderdale, FL, USA, April …, 2018 - Springer
This paper presents an FPGA implementation of the Niederreiter cryptosystem using binary
Goppa codes, including modules for encryption, decryption, and key generation. We …

A key-recovery side-channel attack on Classic McEliece implementations

Q Guo, A Johansson, T Johansson - IACR Transactions on …, 2022 - tches.iacr.org
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a
KEM finalist in the NIST Post-quantum Cryptography Standardization Project. Our novel idea …

Side channel information set decoding using iterative chunking: Plaintext recovery from the “Classic McEliece” hardware reference implementation

N Lahr, R Niederhagen, R Petri… - … Conference on the Theory …, 2020 - Springer
This paper presents an attack based on side-channel information and (ISD) on the code-
based Niederreiter cryptosystem and an evaluation of the practicality of the attack using an …

A timing attack against the secret permutation in the McEliece PKC

F Strenzke - … Workshop, PQCrypto 2010, Darmstadt, Germany, May …, 2010 - Springer
In this work we present a novel timing attack against the McEliece public key cryptosystem
(PKC). In contrast to former works investigating timing attacks that aim at recovering the …

A Side-Channel Assisted Cryptanalytic Attack Against QcBits

M Rossi, M Hamburg, M Hutter, ME Marson - Cryptographic Hardware and …, 2017 - Springer
QcBits is a code-based public key algorithm based on a problem thought to be resistant to
quantum computer attacks. It is a constant-time implementation for a quasi-cyclic moderate …

Roadmap of post-quantum cryptography standardization: Side-channel attacks and countermeasures

A Shaller, L Zamir, M Nojoumian - Information and Computation, 2023 - Elsevier
Quantum computing utilizes properties of quantum physics to build a fast-computing
machine that can perform quantum computations. This will eventually lead to faster and …

Information-set decoding with hints

AL Horlemann, S Puchinger, J Renner… - Code-Based …, 2021 - Springer
This paper studies how to incorporate small information leakages (called “hints”) into
information-set decoding (ISD) algorithms. In particular, the influence of these hints on …