{"id":"https://openalex.org/W2988496150","doi":"https://doi.org/10.1145/3338467.3358948","title":"Timing Attacks on Error Correcting Codes in Post-Quantum Schemes","display_name":"Timing Attacks on Error Correcting Codes in Post-Quantum Schemes","publication_year":2019,"publication_date":"2019-11-08","ids":{"openalex":"https://openalex.org/W2988496150","doi":"https://doi.org/10.1145/3338467.3358948","mag":"2988496150"},"language":"en","primary_location":{"id":"doi:10.1145/3338467.3358948","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3338467.3358948","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of ACM Workshop on Theory of Implementation Security Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://lirias.kuleuven.be/handle/123456789/671424","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048759552","display_name":"Jan-Pieter D\u2019Anvers","orcid":"https://orcid.org/0000-0001-9675-7988"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Jan-Pieter D'Anvers","raw_affiliation_strings":["KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039923147","display_name":"Marcel Tiepelt","orcid":"https://orcid.org/0000-0002-3389-208X"},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Marcel Tiepelt","raw_affiliation_strings":["Karlsruhe Institute of Technology, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Karlsruhe Institute of Technology, Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032574536","display_name":"Fr\u00e9derik Vercauteren","orcid":"https://orcid.org/0000-0002-7208-9599"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Frederik Vercauteren","raw_affiliation_strings":["KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082347771","display_name":"Ingrid Verbauwhede","orcid":"https://orcid.org/0000-0002-0879-076X"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Ingrid Verbauwhede","raw_affiliation_strings":["KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5048759552"],"corresponding_institution_ids":["https://openalex.org/I99464096"],"apc_list":null,"apc_paid":null,"fwci":4.0605,"has_fulltext":false,"cited_by_count":57,"citation_normalized_percentile":{"value":0.95206121,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7391957640647888},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.6412209868431091},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5624011158943176},{"id":"https://openalex.org/keywords/error-detection-and-correction","display_name":"Error detection and correction","score":0.5329633355140686},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4736132323741913},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45921704173088074},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.4176395535469055},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41711103916168213},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.4146939814090729},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4055712819099426},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.36326321959495544},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27136367559432983},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.0844539999961853}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7391957640647888},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.6412209868431091},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5624011158943176},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.5329633355140686},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4736132323741913},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45921704173088074},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.4176395535469055},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41711103916168213},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.4146939814090729},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4055712819099426},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.36326321959495544},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27136367559432983},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.0844539999961853}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3338467.3358948","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3338467.3358948","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of ACM Workshop on Theory of Implementation Security Workshop","raw_type":"proceedings-article"},{"id":"pmh:oai:lirias2repo.kuleuven.be:123456789/671424","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/123456789/671424","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Theory of Implementation Security Workshop, London, United Kingdom, 11 November 2019","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:lirias2repo.kuleuven.be:123456789/671424","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/123456789/671424","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Theory of Implementation Security Workshop, London, United Kingdom, 11 November 2019","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"score":0.6700000166893005,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G100558378","display_name":null,"funder_award_id":"Cathedral ERC Advanced Grant 695305","funder_id":"https://openalex.org/F4320335254","funder_display_name":"Horizon 2020"},{"id":"https://openalex.org/G99346115","display_name":null,"funder_award_id":"C16/15/058","funder_id":"https://openalex.org/F4320322681","funder_display_name":"Onderzoeksraad, KU Leuven"}],"funders":[{"id":"https://openalex.org/F4320322681","display_name":"Onderzoeksraad, KU Leuven","ror":"https://ror.org/05f950310"},{"id":"https://openalex.org/F4320335254","display_name":"Horizon 2020","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1613874182","https://openalex.org/W1995261385","https://openalex.org/W2071825329","https://openalex.org/W2083774980","https://openalex.org/W2098290658","https://openalex.org/W2412886904","https://openalex.org/W2491909939","https://openalex.org/W2494078997","https://openalex.org/W2528526964","https://openalex.org/W2729344185","https://openalex.org/W2740966734","https://openalex.org/W2765784230","https://openalex.org/W2794852638","https://openalex.org/W2794874206","https://openalex.org/W2796314191","https://openalex.org/W2866028610","https://openalex.org/W2907980953","https://openalex.org/W2953078406","https://openalex.org/W2960496836","https://openalex.org/W3216147140","https://openalex.org/W4205948809","https://openalex.org/W4250179531","https://openalex.org/W6724049718"],"related_works":["https://openalex.org/W1971956962","https://openalex.org/W4387031668","https://openalex.org/W2188560665","https://openalex.org/W2887442533","https://openalex.org/W4297042454","https://openalex.org/W1566796882","https://openalex.org/W2786453435","https://openalex.org/W3028997939","https://openalex.org/W1579351653","https://openalex.org/W3028997697"],"abstract_inverted_index":{"While":[0],"error":[1,69],"correcting":[2],"codes":[3],"(ECC)":[4],"have":[5],"the":[6,11,25,37,81,86,100,117,122,127,135,151,154,211],"potential":[7],"to":[8,24,43,57,61,80,98,116,163,199],"significantly":[9],"reduce":[10],"failure":[12],"probability":[13],"of":[14,85,103,143,157,213],"post-quantum":[15,104],"schemes,":[16],"they":[17],"add":[18],"an":[19,68,109],"extra":[20],"ECC":[21,87,204],"decoding":[22,71,88],"step":[23,31],"algorithm.":[26,89],"Even":[27],"though":[28],"this":[29,93],"additional":[30],"does":[32],"not":[33,76],"compute":[34],"directly":[35],"on":[36,111,150],"secret":[38,137,166,185],"key,":[39],"it":[40,54],"is":[41,52,55,148,161,215],"susceptible":[42],"side-channel":[44,208],"attacks.":[45],"We":[46,90],"show":[47],"that":[48,65,74,92],"if":[49],"no":[50],"precaution":[51],"taken,":[53],"possible":[56],"use":[58],"timing":[59],"information":[60,94,209],"distinguish":[62],"between":[63],"ciphertexts":[64,73],"result":[66],"in":[67,172,187,205],"before":[70],"and":[72,126,147,153,183],"do":[75],"contain":[77],"errors,":[78],"due":[79],"variable":[82],"execution":[83],"time":[84],"demonstrate":[91],"can":[95],"be":[96],"used":[97],"break":[99],"IND-CCA":[101],"security":[102,170],"secure":[105],"schemes":[106,202],"by":[107],"presenting":[108],"attack":[110,133,197],"two":[112],"round":[113],"1":[114],"candidates":[115],"NIST":[118],"Post-Quantum":[119],"Standardization":[120],"Process:":[121],"Ring-LWE":[123],"scheme":[124,130],"LAC":[125],"Mersenne":[128],"prime":[129],"Ramstake.":[131],"This":[132],"recovers":[134],"full":[136],"key":[138,167,186],"using":[139,176,191],"a":[140],"limited":[141],"number":[142],"timed":[144],"decryption":[145,181,194],"queries":[146,182],"implemented":[149],"reference":[152],"optimized":[155],"implementations":[156],"both":[158],"submissions.":[159],"It":[160],"able":[162],"retrieve":[164],"LAC's":[165],"for":[168],"all":[169],"levels":[171],"under":[173,188],"2":[174,189],"minutes":[175,190],"less":[177],"than":[178],"$2^16":[179],"$":[180],"Ramstake's":[184],"approximately":[192],"$2400$":[193],"queries.":[195],"The":[196],"generalizes":[198],"other":[200],"lattice-based":[201],"with":[203],"which":[206],"any":[207],"about":[210],"presence":[212],"errors":[214],"leaked":[216],"during":[217],"decoding.":[218]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
