1 – 10 of 10
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2025
-
Mark
Multi-Value Plaintext-Checking and Full-Decryption Oracle-Based Attacks on HQC from Offline Templates
- Contribution to journal › Article
-
Mark
OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates
- Contribution to journal › Article
- 2023
-
Mark
Cache-Timing Attack Against HQC
- Contribution to journal › Article
-
Mark
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors
- Contribution to journal › Article
-
Mark
Find the Bad Apples: An efficient method for perfectkey recovery under imperfect SCA oracles– A case study of Kyber
(2023) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2023(1). p.89-112
- Contribution to journal › Article
- 2022
-
Mark
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
(2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(3). p.223-263
- Contribution to journal › Article
-
Mark
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
(2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(4). p.800-827
- Contribution to journal › Article
- 2021
-
Mark
A side-channel attack on a masked IND-CCA secure saber KEM implementation
- Contribution to journal › Article
- 2020
-
Mark
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
(2020) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2020(4). p.209-238
- Contribution to journal › Article
- 2018
-
Mark
Error Amplification in Code-based Cryptography
(2018) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2019(1). p.238-258
- Contribution to journal › Article
