2024
A New Sieving-Style Information-Set Decoding Algorithm.
IEEE Trans. Inf. Theory, November, 2024
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks.
IACR Cryptol. ePrint Arch., 2024
Grafted Trees Bear Better Fruit: An Improved Multiple-Valued Plaintext-Checking Side-Channel Attack against Kyber.
IACR Cryptol. ePrint Arch., 2024
The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber.
IACR Commun. Cryptol., 2024
Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures.
Proceedings of the 33rd USENIX Security Symposium, 2024
A Key-Recovery Attack on the LCMQ Authentication Protocol.
Proceedings of the IEEE International Symposium on Information Theory, 2024
2023
Modeling and simulating the sample complexity of solving LWE using BKW-style algorithms.
Cryptogr. Commun., March, 2023
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles - A case study of Kyber.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
Cache-Timing Attack Against HQC.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes.
IACR Cryptol. ePrint Arch., 2023
2022
Revisiting the Concrete Security of Goldreich's Pseudorandom Generator.
IEEE Trans. Inf. Theory, 2022
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
A Key-Recovery Side-Channel Attack on Classic McEliece.
IACR Cryptol. ePrint Arch., 2022
Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber.
IACR Cryptol. ePrint Arch., 2022
2021
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM.
IACR Cryptol. ePrint Arch., 2021
Improvements on Making BKW Practical for Solving LWE.
Cryptogr., 2021
On the Sample Complexity of solving LWE using BKW-Style Algorithms.
Proceedings of the IEEE International Symposium on Information Theory, 2021
Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
Solving LPN Using Covering Codes.
J. Cryptol., 2020
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM.
IACR Cryptol. ePrint Arch., 2020
Making the BKW Algorithm Practical for LWE.
IACR Cryptol. ePrint Arch., 2020
A New Decryption Failure Attack Against HQC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
A Key Recovery Reaction Attack on QC-MDPC.
IEEE Trans. Inf. Theory, 2019
On the Asymptotics of Solving the LWE Problem Using Coded-BKW With Sieving.
IEEE Trans. Inf. Theory, 2019
A new birthday-type algorithm for attacking the fresh re-keying countermeasure.
Inf. Process. Lett., 2019
A Novel CCA Attack using Decryption Errors against LAC.
IACR Cryptol. ePrint Arch., 2019
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke.
IACR Cryptol. ePrint Arch., 2019
Some cryptanalytic and coding-theoretic applications of a soft stern algorithm.
Adv. Math. Commun., 2019
Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
2018
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint.
IACR Cryptol. ePrint Arch., 2018
Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
2017
A Reaction Attack on the QC-LDPC McEliece Cryptosystem.
IACR Cryptol. ePrint Arch., 2017
Information set decoding with soft information and some cryptographic applications.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Connecting and Improving Direct Sum Masking and Inner Product Masking.
Proceedings of the Smart Card Research and Advanced Applications, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
Using Coding Techniques for Attacking Post-Quantum Cryptographic Assumptions and Systems.
PhD thesis, 2016
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors.
IACR Cryptol. ePrint Arch., 2016
Coded-BKW: Solving LWE Using Lattice Codes.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
2015
A New Algorithm for Solving Ring-LPN With a Reducible Polynomial.
IEEE Trans. Inf. Theory, 2015
2014
An Average-Case Efficient Algorithm on Testing the Identity of Boolean Functions in Trace Representation.
IEICE Trans. Inf. Syst., 2014
2013
An efficient interpolation-based systematic encoder for low-rate Blaum-Roth codes.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
2012
A novel elementary construction of matching vectors.
Inf. Process. Lett., 2012
An Efficient Interpolation Based Erasure-Only Decoder for High-Rate Reed-Solomon Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
2011
On systematic encoding for Blaum-Roth codes.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011