{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:49:10Z","timestamp":1767322150065,"version":"3.48.0"},"publisher-location":"Singapore","reference-count":34,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562053","type":"print"},{"value":"9789819562060","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6206-0_29","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:44:24Z","timestamp":1767321864000},"page":"550-568","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bit-By-Bit Total Collapse: A Novel Side-Channel Attack on\u00a0HQC-128 Decapsulation"],"prefix":"10.1007","author":[{"given":"Yang","family":"Yi","sequence":"first","affiliation":[]},{"given":"Zhu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Du","sequence":"additional","affiliation":[]},{"given":"Aimin","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"29_CR1","unstructured":"Aguilar\u00a0Melchor, C., et al.: Hamming Quasi-Cyclic (HQC) Third Round Version. NIST Post-Quantum Cryptography Standardization Process (2020)"},{"key":"29_CR2","unstructured":"Aragon, N., Gaborit, P., Z\u00e9mor, G.: HQC-RMRS, an instantiation of the HQC encryption framework with a more efficient auxiliary error-correcting code. arXiv preprint arXiv:2005.10741 (2020)"},{"key":"29_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1007\/978-3-030-17656-3_26","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2019","author":"C B\u0103etu","year":"2019","unstructured":"B\u0103etu, C., Durak, F.B., Huguenin-Dumittan, L., Talayhan, A., Vaudenay, S.: Misuse attacks on post-quantum cryptosystems. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11477, pp. 747\u2013776. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17656-3_26"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Ba\u00efsse, et al.: Secret and shared keys recovery on hamming quasi-cyclic with SASCA, pp. 1\u201321. Designs, Codes and Cryptography pp (2025)","DOI":"10.1007\/s10623-025-01575-2"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Bos, J.W., Gourjon, M., Renes, J., Schneider, T., Van\u00a0Vredendaal, C.: Masking kyber: first-and higher-order implementations. IACR Trans. Cryptogr. Hardware Embed. Syst., 173\u2013214 (2021)","DOI":"10.46586\/tches.v2021.i4.173-214"},{"key":"29_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2"},{"key":"29_CR7","doi-asserted-by":"publisher","unstructured":"Dong, H., Guo, Q.: OT-PCA: new key-recovery plaintext-checking oracle based side-channel attacks on HQC with offline templates. IACR Trans. Cryptogr. Hardware Embed. Syst. 2025, 251\u2013274 (2024). https:\/\/doi.org\/10.46586\/tches.v2025.i1.251-274, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/11929","DOI":"10.46586\/tches.v2025.i1.251-274"},{"key":"29_CR8","doi-asserted-by":"publisher","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M.J. (ed.) Advances in Cryptology - CRYPTO 1999, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, 15-19 August 1999, Proceedings. LNCS, vol.\u00a01666, pp. 537\u2013554. Springer (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_34","DOI":"10.1007\/3-540-48405-1_34"},{"key":"29_CR9","doi-asserted-by":"publisher","unstructured":"Goy, G., Loiseau, A., Gaborit, P.: A new key recovery side-channel attack on HQC with chosen ciphertext. In: International Conference on Post-Quantum Cryptography, pp. 353\u2013371. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-17234-2_17","DOI":"10.1007\/978-3-031-17234-2_17"},{"key":"29_CR10","doi-asserted-by":"publisher","unstructured":"Goy, G., Maillard, J., Gaborit, P., Loiseau, A.: Single trace HQC shared key recovery with SASCA. IACR Trans. Cryptogr. Hardware Embed. Syst. 2024(2), 64\u201387 (2024). https:\/\/doi.org\/10.46586\/tches.v2024.i2.64-87","DOI":"10.46586\/tches.v2024.i2.64-87"},{"key":"29_CR11","unstructured":"G\u00fcneri, C., Ling, S., \u00d6zkaya, B.: Quasi-Cyclic Codes. CoRR abs\/2007.16029 (2020). https:\/\/arxiv.org\/abs\/2007.16029"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Guo, Q., Hlauschek, C., Johansson, T., Lahr, N., Nilsson, A., Schr\u00f6der, R.L.: Don\u2019t reject this: Key-recovery timing attacks due to rejection-sampling in HQC and BIKE. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 223\u2013263 (2022)","DOI":"10.46586\/tches.v2022.i3.223-263"},{"key":"29_CR13","doi-asserted-by":"publisher","unstructured":"Guo, Q., Nabokov, D., Nilsson, A., Johansson, T.: SCA-LDPC: A code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 203\u2013236. Springer (2023). https:\/\/doi.org\/10.1007\/978-981-99-8730-6_7","DOI":"10.1007\/978-981-99-8730-6_7"},{"key":"29_CR14","unstructured":"Heinz, D., Kannwischer, M.J., Land, G., P\u00f6ppelmann, T., Schwabe, P., Sprenkels, A.: First-order masked Kyber on ARM Cortex-M4. Cryptology ePrint Archive (2022)"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Huang, S., Sim, R.Q., Chuengsatiansup, C., Guo, Q., Johansson, T.: Cache-timing attack against HQC. Cryptology ePrint Archive (2023)","DOI":"10.46586\/tches.v2023.i3.136-163"},{"key":"29_CR16","doi-asserted-by":"publisher","unstructured":"Kannwischer, M.J., Schwabe, P., Stebila, D., Wiggers, T.: Improving software quality in cryptography standardization projects. In: IEEE European Symposium on Security and Privacy, EuroS &P 2022 - Workshops, Genoa, Italy, 6-10 June 2022, pp. 19\u201330. IEEE Computer Society, Los Alamitos, CA, USA (2022). https:\/\/doi.org\/10.1109\/EuroSPW55150.2022.00010, https:\/\/eprint.iacr.org\/2022\/337","DOI":"10.1109\/EuroSPW55150.2022.00010"},{"key":"29_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"29_CR18","first-page":"114","volume":"42\u201344","author":"RJ McEliece","year":"1978","unstructured":"McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Progress Report 42\u201344, 114\u2013116 (1978)","journal-title":"DSN Progress Report"},{"key":"29_CR19","unstructured":"National Institute of Standards and Technology: Post-quantum cryptography standardization. https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/post-quantum-cryptography-standardization. Accessed 12 June 2025"},{"key":"29_CR20","unstructured":"National Institute of Standards and Technology: Post-quantum cryptography standardization: call for proposals. https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/post-quantum-cryptography-standardization\/Call-for-Proposals. Accessed 12 June 2025"},{"key":"29_CR21","unstructured":"Oder, T., Schneider, T., P\u00f6ppelmann, T., G\u00fcneysu, T.: Practical CCA2-secure and masked ring-LWE implementation. Cryptology ePrint Archive (2016)"},{"key":"29_CR22","doi-asserted-by":"publisher","unstructured":"Paiva, T.B., Ravi, P., Jap, D., Bhasin, S., Das, S., Chattopadhyay, A.: Et tu, Brute? Side-channel assisted chosen ciphertext attacks using valid ciphertexts on HQC KEM. In: International Conference on Post-Quantum Cryptography, pp. 294\u2013321. Springer (2025). https:\/\/doi.org\/10.1007\/978-3-031-86602-9_11","DOI":"10.1007\/978-3-031-86602-9_11"},{"key":"29_CR23","doi-asserted-by":"publisher","unstructured":"Paiva, T.B., Terada, R.: A timing attack on the HQC encryption scheme. In: Selected Areas in Cryptography\u2013SAC 2019: 26th International Conference, Waterloo, ON, Canada, 12\u201316 August 2019, Revised Selected Papers 26, pp. 551\u2013573. Springer (2020). https:\/\/doi.org\/10.1007\/978-3-030-38471-5_22","DOI":"10.1007\/978-3-030-38471-5_22"},{"key":"29_CR24","doi-asserted-by":"publisher","unstructured":"Prouff, E., Rivain, M.: Masking against side-channel attacks: a formal security proof. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 142\u2013159. Springer (2013). https:\/\/doi.org\/10.1007\/978-3-642-38348-9_9","DOI":"10.1007\/978-3-642-38348-9_9"},{"key":"29_CR25","doi-asserted-by":"publisher","unstructured":"Ravi, P., Sinha\u00a0Roy, S., Chattopadhyay, A., Bhasin, S.: Generic side-channel attacks on CCA-secure lattice-based PKE and KEMs. IACR Transactions on Cryptographic Hardware and Embedded Systems 2020(3), 307\u2013335 (2020). https:\/\/doi.org\/10.13154\/tches.v2020.i3.307-335","DOI":"10.13154\/tches.v2020.i3.307-335"},{"key":"29_CR26","doi-asserted-by":"publisher","unstructured":"Reparaz, O., Sinha\u00a0Roy, S., Vercauteren, F., Verbauwhede, I.: A masked ring-LWE implementation. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 683\u2013702. Springer (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_34","DOI":"10.1007\/978-3-662-48324-4_34"},{"key":"29_CR27","doi-asserted-by":"publisher","unstructured":"Schamberger, T., Holzbaur, L., Renner, J., Wachter-Zeh, A., Sigl, G.: A power side-channel attack on the reed-muller reed-solomon version of the HQC cryptosystem. In: International Conference on Post-Quantum Cryptography, pp. 327\u2013352. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-17234-2_16","DOI":"10.1007\/978-3-031-17234-2_16"},{"key":"29_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-030-68487-7_8","volume-title":"Smart Card Research and Advanced Applications","author":"T Schamberger","year":"2021","unstructured":"Schamberger, T., Renner, J., Sigl, G., Wachter-Zeh, A.: A power side-channel attack on the CCA2-secure HQC KEM. In: Liardet, P.-Y., Mentens, N. (eds.) CARDIS 2020. LNCS, vol. 12609, pp. 119\u2013134. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68487-7_8"},{"key":"29_CR29","unstructured":"Schr\u00f6der, R.L., Gast, S., Guo, Q.: Divide and surrender: exploiting variable division instruction timing in HQC key recovery attacks. In: 33rd USENIX Security Symposium (USENIX Security 24), pp. 6669\u20136686 (2024)"},{"key":"29_CR30","unstructured":"Sendrier, N.: Secure sampling of constant-weight words\u2013application to bike. Cryptology ePrint Archive (2021)"},{"issue":"5","key":"29_CR31","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997). https:\/\/doi.org\/10.1137\/S0097539795293172","journal-title":"SIAM J. Comput."},{"key":"29_CR32","doi-asserted-by":"publisher","unstructured":"Ueno, R., Xagawa, K., Tanaka, Y., Ito, A., Takahashi, J., Homma, N.: Curse of Re-encryption: a generic power\/em analysis on post-quantum KEMs. IACR Transactions on Cryptographic Hardware and Embedded Systems 2022(1), 296\u2013322 (2021). https:\/\/doi.org\/10.46586\/tches.v2022.i1.296-322","DOI":"10.46586\/tches.v2022.i1.296-322"},{"key":"29_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-662-45611-8_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","author":"N Veyrat-Charvillon","year":"2014","unstructured":"Veyrat-Charvillon, N., G\u00e9rard, B., Standaert, F.-X.: Soft analytical side-channel attacks. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 282\u2013296. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45611-8_15"},{"key":"29_CR34","unstructured":"Wafo-Tapa, G., Bettaieb, S., Bidoux, L., Gaborit, P., Marcatel, E.: A practicable timing attack against HQC and its countermeasure. Cryptology ePrint Archive (2019)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6206-0_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:44:26Z","timestamp":1767321866000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6206-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562053","9789819562060"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6206-0_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}