{"id":"https://openalex.org/W4415366461","doi":"https://doi.org/10.1109/access.2025.3623939","title":"Analyzing IND-CPA Security of HQC Codes Using k-Nearest Neighbors","display_name":"Analyzing IND-CPA Security of HQC Codes Using k-Nearest Neighbors","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4415366461","doi":"https://doi.org/10.1109/access.2025.3623939"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3623939","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3623939","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3623939","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120072113","display_name":"Emilio Volpe","orcid":null},"institutions":[{"id":"https://openalex.org/I35961687","display_name":"Universidad de Antioquia","ror":"https://ror.org/03bp5hc83","country_code":"CO","type":"education","lineage":["https://openalex.org/I35961687"]}],"countries":["CO"],"is_corresponding":true,"raw_author_name":"Emilio Volpe","raw_affiliation_strings":["Factored AI, Medell&#x00ED;n, Antioquia, Colombia"],"raw_orcid":"https://orcid.org/0009-0006-7881-1817","affiliations":[{"raw_affiliation_string":"Factored AI, Medell&#x00ED;n, Antioquia, Colombia","institution_ids":["https://openalex.org/I35961687"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085060336","display_name":"Val\u00e9rie Gauthier\u2013Uma\u00f1a","orcid":"https://orcid.org/0000-0003-0909-7091"},"institutions":[{"id":"https://openalex.org/I162096671","display_name":"Universidad de Los Andes","ror":"https://ror.org/02mhbdp94","country_code":"CO","type":"education","lineage":["https://openalex.org/I162096671"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Val\u00e9rie Gauthier-Uma\u00f1a","raw_affiliation_strings":["Department of Systems and Computing Engineering, Universidad de los Andes, Bogot&#x00E1;, Colombia"],"raw_orcid":"https://orcid.org/0000-0003-0909-7091","affiliations":[{"raw_affiliation_string":"Department of Systems and Computing Engineering, Universidad de los Andes, Bogot&#x00E1;, Colombia","institution_ids":["https://openalex.org/I162096671"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5120072113"],"corresponding_institution_ids":["https://openalex.org/I35961687"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14799334,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"184122","last_page":"184132"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9758999943733215,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.967199981212616,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/learnability","display_name":"Learnability","score":0.6714000105857849},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.6189000010490417},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5974000096321106},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.5892999768257141},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4916999936103821},{"id":"https://openalex.org/keywords/manifold","display_name":"Manifold (fluid mechanics)","score":0.3950999975204468}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6937999725341797},{"id":"https://openalex.org/C2777723229","wikidata":"https://www.wikidata.org/wiki/Q4367921","display_name":"Learnability","level":2,"score":0.6714000105857849},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.6189000010490417},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.6060000061988831},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5974000096321106},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.5892999768257141},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4916999936103821},{"id":"https://openalex.org/C529865628","wikidata":"https://www.wikidata.org/wiki/Q1790740","display_name":"Manifold (fluid mechanics)","level":2,"score":0.3950999975204468},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.3912999927997589},{"id":"https://openalex.org/C63361517","wikidata":"https://www.wikidata.org/wiki/Q5645805","display_name":"Hamming weight","level":5,"score":0.3707999885082245},{"id":"https://openalex.org/C9376300","wikidata":"https://www.wikidata.org/wiki/Q168817","display_name":"Algebraic number","level":2,"score":0.36399999260902405},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3255000114440918},{"id":"https://openalex.org/C73150493","wikidata":"https://www.wikidata.org/wiki/Q853922","display_name":"Hamming code","level":4,"score":0.3237000107765198},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28130000829696655},{"id":"https://openalex.org/C182419690","wikidata":"https://www.wikidata.org/wiki/Q205464","display_name":"Algebraic structure","level":2,"score":0.25679999589920044},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2563999891281128},{"id":"https://openalex.org/C49777392","wikidata":"https://www.wikidata.org/wiki/Q5535495","display_name":"Geometric networks","level":3,"score":0.2558000087738037}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3623939","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3623939","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:0a399877f15644a89c7ac27da3a23008","is_oa":true,"landing_page_url":"https://doaj.org/article/0a399877f15644a89c7ac27da3a23008","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 184122-184132 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3623939","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3623939","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Hamming":[0],"Quasi-Cyclic":[1],"(HQC)":[2],"codes,":[3],"recently":[4],"selected":[5],"by":[6],"NIST":[7],"for":[8],"post-quantum":[9],"cryptography":[10],"standardization,":[11],"rely":[12],"on":[13],"the":[14,17,93],"hardness":[15,94],"of":[16,47,96],"2-QCSD":[18],"problem.":[19],"While":[20],"typically":[21],"analyzed":[22],"through":[23],"algebraic":[24],"methods,":[25],"we":[26,40,68],"apply":[27,51],"AI-driven":[28],"techniques":[29,87],"to":[30,55],"explore":[31],"their":[32],"IND-CPA":[33],"security.":[34],"Using":[35],"manifold":[36],"learning":[37],"(e.g.,":[38],"Isomap),":[39],"reveal":[41],"geometric":[42,84],"structure":[43],"in":[44],"high-dimensional":[45],"embeddings":[46],"code":[48],"instances.We":[49],"then":[50],"k-Nearest":[52],"Neighbors":[53],"(KNN)":[54],"assess":[56],"separability":[57],"and":[58,85],"potential":[59],"learnability":[60],"within":[61],"this":[62,66],"space.":[63],"To":[64],"scale":[65],"analysis,":[67],"incorporate":[69],"Hierarchical":[70],"Navigable":[71],"Small":[72],"World":[73],"(HNSW)":[74],"graphs,":[75],"enabling":[76],"efficient":[77],"nearest-neighbor":[78],"search.":[79],"Our":[80],"results":[81],"suggest":[82],"that":[83],"learning-based":[86],"may":[88],"offer":[89],"new":[90],"insights":[91],"into":[92],"assumptions":[95],"HQC-based":[97],"cryptography.":[98]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-21T00:00:00"}
