{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:50:01Z","timestamp":1767340201168,"version":"3.40.2"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031866012","type":"print"},{"value":"9783031866029","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-86602-9_11","type":"book-chapter","created":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T23:51:07Z","timestamp":1742860267000},"page":"294-321","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Et tu, Brute? Side-Channel Assisted Chosen Ciphertext Attacks Using Valid Ciphertexts on\u00a0HQC KEM"],"prefix":"10.1007","author":[{"given":"Thales B.","family":"Paiva","sequence":"first","affiliation":[]},{"given":"Prasanna","family":"Ravi","sequence":"additional","affiliation":[]},{"given":"Dirmanto","family":"Jap","sequence":"additional","affiliation":[]},{"given":"Shivam","family":"Bhasin","sequence":"additional","affiliation":[]},{"given":"Sayan","family":"Das","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,15]]},"reference":[{"key":"11_CR1","unstructured":"Alkim, E., et al.: FrodoKEM learning with errors key encapsulation: Algorithm specifications and supporting documentation (September 30, 2020) (2020). https:\/\/frodokem.org\/files\/FrodoKEM-specification-20200930.pdf"},{"key":"11_CR2","unstructured":"Apon, D., Howe, J.: Attacks on NIST PQC 3rd Round Candidates (2021) invited talk at Real World Crypto 2021. https:\/\/iacr.org\/submit\/files\/slides\/2021\/rwc\/rwc2021\/22\/slides.pdf"},{"key":"11_CR3","unstructured":"Aragon, N., et al.: BIKE: Bit flipping key encapsulation (2021). https:\/\/bikesuite.org\/files\/v4.2\/BIKE_Spec.2021.09.29.1.pdf"},{"key":"11_CR4","unstructured":"Bernstein, D.J., et al.: Classic McEliece: conservative code-based cryptography (2019). https:\/\/classic.mceliece.org\/nist\/mceliece-20190331.pdf"},{"key":"11_CR5","doi-asserted-by":"publisher","unstructured":"Bhasin, S., D\u2019Anvers, J.P., Heinz, D., P\u00f6ppelmann, T., van Beirendonck, M.: Attacking and defending masked polynomial comparison for lattice-based cryptography. IACR Trans. Cryptograph. Hardware Embedded Syst. 2021(3), 334\u2013359 (Jul 2021). https:\/\/doi.org\/10.46586\/tches.v2021.i3.334-359, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8977","DOI":"10.46586\/tches.v2021.i3.334-359"},{"key":"11_CR6","doi-asserted-by":"publisher","unstructured":"Bos, J.W., Gourjon, M., Renes, J., Schneider, T., van Vredendaal, C.: Masking kyber: first- and higher-order implementations. IACR Trans. Cryptograph. Hardware Embedded Syst. 2021(4), 173-214 (Aug 2021). https:\/\/doi.org\/10.46586\/tches.v2021.i4.173-214, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/9064","DOI":"10.46586\/tches.v2021.i4.173-214"},{"issue":"1","key":"11_CR7","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TIT.1962.1057683","volume":"8","author":"R Gallager","year":"1962","unstructured":"Gallager, R.: Low-density parity-check codes. IRE Trans. Inform. Theor. 8(1), 21\u201328 (1962). https:\/\/doi.org\/10.1109\/TIT.1962.1057683","journal-title":"IRE Trans. Inform. Theor."},{"key":"11_CR8","unstructured":"Goodwill, G., Jun, B., Jaffe, J., Rohatgi, P.: A testing methodology for side-channel resistance validation. In: NIST Non-Invasive Attack Testing Workshop. vol.\u00a07, pp. 115\u2013136 (2011), https:\/\/csrc.nist.rip\/news_events\/non-invasive-attack-testing-workshop\/papers\/08_Goodwill.pdf"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-031-17234-2_17","volume-title":"Post-Quantum Cryptography: 13th International Workshop, PQCrypto 2022, Virtual Event, September 28\u201330, 2022, Proceedings","author":"G Goy","year":"2022","unstructured":"Goy, G., Loiseau, A., Gaborit, P.: A new key recovery side-channel attack on\u00a0HQC with\u00a0chosen ciphertext. In: Cheon, J.H., Johansson, T. (eds.) Post-Quantum Cryptography: 13th International Workshop, PQCrypto 2022, Virtual Event, September 28\u201330, 2022, Proceedings, pp. 353\u2013371. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17234-2_17"},{"key":"11_CR10","doi-asserted-by":"publisher","unstructured":"Guo, Q., Hlauschek, C., Johansson, T., Lahr, N., Nilsson, A., Schr\u00f6der, R.L.: Don\u2019t reject this: key-recovery timing attacks due to rejection-sampling in HQC and BIKE. IACR Trans. Cryptograph. Hardw. Embedded Syst. 223\u2013263 (2022). https:\/\/doi.org\/10.46586\/tches.v2022.i3.223-263","DOI":"10.46586\/tches.v2022.i3.223-263"},{"key":"11_CR11","doi-asserted-by":"publisher","unstructured":"Hamburg, M., et al.: Chosen ciphertext k-trace attacks on masked CCA2 secure Kyber. IACR Trans. Cryptograph. Hardware Embedded Syst. 2021(4), 88\u2013113 (Aug 2021). https:\/\/doi.org\/10.46586\/tches.v2021.i4.88-113, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/9061","DOI":"10.46586\/tches.v2021.i4.88-113"},{"key":"11_CR12","doi-asserted-by":"publisher","unstructured":"Hofheinz, D., H\u00f6velmanns, K., Kiltz, E.: A modular analysis of the Fujisaki-Okamoto transformation. In: Kalai, Y., Reyzin, L. (eds.) Theory of Cryptography, pp. 341\u2013371. Springer International Publishing, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70500-2_12","DOI":"10.1007\/978-3-319-70500-2_12"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-030-98365-9_4","volume-title":"Code-Based Cryptography: 9th International Workshop, CBCrypto 2021 Munich, Germany, June 21\u201322, 2021 Revised Selected Papers","author":"A-L Horlemann","year":"2022","unstructured":"Horlemann, A.-L., Puchinger, S., Renner, J., Schamberger, T., Wachter-Zeh, A.: Information-set decoding with\u00a0hints. In: Wachter-Zeh, A., Bartz, H., Liva, G. (eds.) Code-Based Cryptography: 9th International Workshop, CBCrypto 2021 Munich, Germany, June 21\u201322, 2021 Revised Selected Papers, pp. 60\u201383. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-98365-9_4"},{"key":"11_CR14","doi-asserted-by":"publisher","unstructured":"Huang, S., Sim, R.Q., Chuengsatiansup, C., Guo, Q., Johansson, T.: Cache-timing attack against HQC. IACR Trans. Cryptograph. Hardware Embedded Syst. 136\u2013163 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i3.136-163","DOI":"10.46586\/tches.v2023.i3.136-163"},{"key":"11_CR15","unstructured":"Kannwischer, M.J., Krausz, M., Petri, R., Yang, S.Y.: pqm4: Benchmarking NIST additional post-quantum signature schemes on microcontrollers. Cryptology ePrint Archive, Paper 2024\/112 (2024). https:\/\/eprint.iacr.org\/2024\/112"},{"key":"11_CR16","unstructured":"Kannwischer, M.J., Rijneveld, J., Schwabe, P., Stoffelen, K.: mupq\/pqm4: Post-quantum crypto library for the ARM Cortex-M4. https:\/\/github.com\/mupq\/pqm4"},{"key":"11_CR17","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The theory of error correcting codes, vol.\u00a016. Elsevier (1977)"},{"key":"11_CR18","unstructured":"Melchor, C.A., et al.: Hamming Quasi-Cyclic: HQC (2021). https:\/\/pqc-hqc.org\/doc\/hqc-specification_2021-06-06.pdf"},{"key":"11_CR19","doi-asserted-by":"publisher","unstructured":"Ngo, K., Dubrova, E., Guo, Q., Johansson, T.: A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation. IACR Trans. Cryptograph. Hardware Embedded Syst. 676\u2013707 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i4.676-707","DOI":"10.46586\/tches.v2021.i4.676-707"},{"key":"11_CR20","doi-asserted-by":"publisher","unstructured":"Oder, T., Schneider, T., P\u00f6ppelmann, T., G\u00fcneysu, T.: Practical CCA2-Secure and Masked Ring-LWE Implementation. IACR Trans. Cryptograph. Hardware Embedded Syst. 142\u2013174 (2018). https:\/\/doi.org\/10.46586\/tches.v2018.i1.142-174","DOI":"10.46586\/tches.v2018.i1.142-174"},{"key":"11_CR21","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/978-3-030-38471-5_22","volume-title":"Selected Areas in Cryptography \u2013 SAC 2019: 26th International Conference, Waterloo, ON, Canada, August 12\u201316, 2019, Revised Selected Papers","author":"TB Paiva","year":"2020","unstructured":"Paiva, T.B., Terada, R.: A timing attack on the HQC encryption\u00a0scheme. In: Paterson, K.G., Stebila, D. (eds.) Selected Areas in Cryptography \u2013 SAC 2019: 26th International Conference, Waterloo, ON, Canada, August 12\u201316, 2019, Revised Selected Papers, pp. 551\u2013573. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-38471-5_22"},{"key":"11_CR22","doi-asserted-by":"publisher","unstructured":"Rajendran, G., Ravi, P., D\u2019Anvers, J.-P., Bhasin, S., Chattopadhyay, A.: Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond. IACR Trans. Cryptograph. Hardware Embedded Syst. 418\u2013446 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i2.418-446","DOI":"10.46586\/tches.v2023.i2.418-446"},{"key":"11_CR23","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1109\/TIFS.2021.3139268","volume":"17","author":"P Ravi","year":"2022","unstructured":"Ravi, P., Bhasin, S., Roy, S.S., Chattopadhyay, A.: On exploiting message leakage in (Few) NIST PQC candidates for practical message recovery attacks. IEEE Trans. Inform. Forensics Secur. 17, 684\u2013699 (2022). https:\/\/doi.org\/10.1109\/TIFS.2021.3139268","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"issue":"2","key":"11_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3603170","volume":"23","author":"P Ravi","year":"2024","unstructured":"Ravi, P., Chattopadhyay, A., D\u2019Anvers, J.P., Baksi, A.: Side-channel and fault-injection attacks over lattice-based post-quantum schemes (Kyber, Dilithium): survey and new results. ACM Trans. Embedded Comput. Syst. 23(2), 1\u201354 (2024). https:\/\/doi.org\/10.1145\/3603170","journal-title":"ACM Trans. Embedded Comput. Syst."},{"key":"11_CR25","unstructured":"Ravi, P., Roy, S.S.: Side-channel analysis of lattice-based PQC candidates. Round 3 Seminars, NIST Post Quantum Cryptography (2021)"},{"key":"11_CR26","doi-asserted-by":"publisher","unstructured":"Ravi, P., Sinha Roy, S., Chattopadhyay, A., Bhasin, S.: Generic side-channel attacks on CCA-secure lattice-based PKE and KEMs. IACR Trans. Cryptograph. Hardware Embedded Syst. 307\u2013335 (2020). https:\/\/doi.org\/10.46586\/tches.v2020.i3.307-335","DOI":"10.46586\/tches.v2020.i3.307-335"},{"key":"11_CR27","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-031-17234-2_16","volume-title":"Post-Quantum Cryptography: 13th International Workshop, PQCrypto 2022, Virtual Event, September 28\u201330, 2022, Proceedings","author":"T Schamberger","year":"2022","unstructured":"Schamberger, T., Holzbaur, L., Renner, J., Wachter-Zeh, A., Sigl, G.: A power side-channel attack on\u00a0the\u00a0reed-muller reed-solomon version of\u00a0the\u00a0HQC cryptosystem. In: Cheon, J.H., Johansson, T. (eds.) Post-Quantum Cryptography: 13th International Workshop, PQCrypto 2022, Virtual Event, September 28\u201330, 2022, Proceedings, pp. 327\u2013352. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17234-2_16"},{"key":"11_CR28","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-030-16350-1_14","volume-title":"Constructive Side-Channel Analysis and Secure Design: 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3\u20135, 2019, Proceedings","author":"T Schamberger","year":"2019","unstructured":"Schamberger, T., Mischke, O., Sepulveda, J.: Practical evaluation of masking for NTRUEncrypt on ARM Cortex-M4. In: Polian, I., St\u00f6ttinger, M. (eds.) Constructive Side-Channel Analysis and Secure Design: 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3\u20135, 2019, Proceedings, pp. 253\u2013269. Springer International Publishing, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-16350-1_14"},{"key":"11_CR29","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-030-68487-7_8","volume-title":"Smart Card Research and Advanced Applications: 19th International Conference, CARDIS 2020, Virtual Event, November 18\u201319, 2020, Revised Selected Papers","author":"T Schamberger","year":"2021","unstructured":"Schamberger, T., Renner, J., Sigl, G., Wachter-Zeh, A.: A power side-channel attack on the CCA2-Secure HQC KEM. In: Liardet, P.-Y., Mentens, N. (eds.) Smart Card Research and Advanced Applications: 19th International Conference, CARDIS 2020, Virtual Event, November 18\u201319, 2020, Revised Selected Papers, pp. 119\u2013134. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68487-7_8"},{"key":"11_CR30","doi-asserted-by":"publisher","unstructured":"Xu, Z., Pemberton, O., Roy, S.S., Oswald, D., Yao, W., Zheng, Z.: Magnifying side-channel leakage of lattice-based cryptosystems with chosen ciphertexts: The case study of Kyber. IEEE Trans. Comput. 71(9), 2163\u20132176 (2020). https:\/\/doi.org\/10.1109\/TC.2021.3122997","DOI":"10.1109\/TC.2021.3122997"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-86602-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T23:51:13Z","timestamp":1742860273000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-86602-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031866012","9783031866029"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-86602-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PQCrypto","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Post-Quantum Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taipei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pqcrypto2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pqcrypto2025.iis.sinica.edu.tw\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}