Algorithmic security is insufficient: A comprehensive survey on implementation attacks haunting post-quantum security

AC Canto, J Kaur, MM Kermani… - arXiv preprint arXiv …, 2023 - arxiv.org
This survey is on forward-looking, emerging security concerns in post-quantum era, ie, the
implementation attacks for 2022 winners of NIST post-quantum cryptography (PQC) …

A survey of timing channels and countermeasures

AK Biswas, D Ghosal, S Nagaraja - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
A timing channel is a communication channel that can transfer information to a
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …

A survey on code-based cryptography

V Weger, N Gassner, J Rosenthal - arXiv preprint arXiv:2201.07119, 2022 - arxiv.org
The improvements on quantum technology are threatening our daily cybersecurity, as a
capable quantum computer can break all currently employed asymmetric cryptosystems. In …

QC-MDPC: a timing attack and a CCA2 KEM

E Eaton, M Lequesne, A Parent, N Sendrier - International conference on …, 2018 - Springer
Abstract In 2013, Misoczki, Tillich, Sendrier and Barreto proposed a variant of the McEliece
cryptosystem based on quasi-cyclic moderate-density parity-check (QC-MDPC) codes. This …

Reliable constructions for the key generator of code-based post-quantum cryptosystems on FPGA

AC Canto, MM Kermani, R Azarderakhsh - ACM Journal on Emerging …, 2022 - dl.acm.org
Advances in quantum computing have urged the need for cryptographic algorithms that are
low-power, low-energy, and secure against attacks that can be potentially enabled. For this …

MicroEliece: McEliece for embedded devices

T Eisenbarth, T Güneysu, S Heyse, C Paar - International Workshop on …, 2009 - Springer
Most advanced security systems rely on public-key schemes based either on the
factorization or the discrete logarithm problem. Since both problems are known to be closely …

A timing attack against the secret permutation in the McEliece PKC

F Strenzke - … Workshop, PQCrypto 2010, Darmstadt, Germany, May …, 2010 - Springer
In this work we present a novel timing attack against the McEliece public key cryptosystem
(PKC). In contrast to former works investigating timing attacks that aim at recovering the …

A timing attack against Patterson algorithm in the McEliece PKC

A Shoufan, F Strenzke, HG Molter… - Information, Security and …, 2010 - Springer
The security of McEliece public-key cryptosystem is based on the difficulty of the decoding
problem which is NP-hard. In this paper we propose a timing attack on the Patterson …

A Side-Channel Assisted Cryptanalytic Attack Against QcBits

M Rossi, M Hamburg, M Hutter, ME Marson - Cryptographic Hardware and …, 2017 - Springer
QcBits is a code-based public key algorithm based on a problem thought to be resistant to
quantum computer attacks. It is a constant-time implementation for a quasi-cyclic moderate …

Information-set decoding with hints

AL Horlemann, S Puchinger, J Renner… - Code-Based …, 2021 - Springer
This paper studies how to incorporate small information leakages (called “hints”) into
information-set decoding (ISD) algorithms. In particular, the influence of these hints on …