{"id":"https://openalex.org/W2897800939","doi":"https://doi.org/10.13154/tches.v2018.i3.500-523","title":"Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations","display_name":"Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations","publication_year":2018,"publication_date":"2018-08-16","ids":{"openalex":"https://openalex.org/W2897800939","doi":"https://doi.org/10.13154/tches.v2018.i3.500-523","mag":"2897800939"},"language":"en","primary_location":{"id":"pmh:oai:doaj.org/article:e41842f602bf48afbe22bfc9dd913dbe","is_oa":true,"landing_page_url":"https://doaj.org/article/e41842f602bf48afbe22bfc9dd913dbe","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 3 (2018)","raw_type":"article"},"type":"article","indexed_in":["datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doaj.org/article/e41842f602bf48afbe22bfc9dd913dbe","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074046030","display_name":"Aesun Park","orcid":null},"institutions":[{"id":"https://openalex.org/I110273157","display_name":"Kookmin University","ror":"https://ror.org/0049erg63","country_code":"KR","type":"education","lineage":["https://openalex.org/I110273157"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Park, Aesun","raw_affiliation_strings":["Department of Financial Information Security, Kookmin University, Seoul"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Financial Information Security, Kookmin University, Seoul","institution_ids":["https://openalex.org/I110273157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059987433","display_name":"Kyung\u2010Ah Shim","orcid":"https://orcid.org/0000-0001-6970-4207"},"institutions":[{"id":"https://openalex.org/I4210158432","display_name":"National Institute for Mathematical Sciences","ror":"https://ror.org/04n7py080","country_code":"KR","type":"education","lineage":["https://openalex.org/I4210158432"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Shim, Kyung-Ah","raw_affiliation_strings":["Division of Mathematical Modeling, National Institute for Mathematical Sciences, Daejeon"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Division of Mathematical Modeling, National Institute for Mathematical Sciences, Daejeon","institution_ids":["https://openalex.org/I4210158432"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055451760","display_name":"Namhun Koo","orcid":"https://orcid.org/0000-0003-1678-8480"},"institutions":[{"id":"https://openalex.org/I4210158432","display_name":"National Institute for Mathematical Sciences","ror":"https://ror.org/04n7py080","country_code":"KR","type":"education","lineage":["https://openalex.org/I4210158432"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Koo, Namhun","raw_affiliation_strings":["Division of Mathematical Modeling, National Institute for Mathematical Sciences, Daejeon"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Division of Mathematical Modeling, National Institute for Mathematical Sciences, Daejeon","institution_ids":["https://openalex.org/I4210158432"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050707173","display_name":"Dong\u2010Guk Han","orcid":"https://orcid.org/0000-0003-1695-5103"},"institutions":[{"id":"https://openalex.org/I110273157","display_name":"Kookmin University","ror":"https://ror.org/0049erg63","country_code":"KR","type":"education","lineage":["https://openalex.org/I110273157"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Han, Dong-Guk","raw_affiliation_strings":["Department of Financial Information Security, Kookmin University, Seoul"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Financial Information Security, Kookmin University, Seoul","institution_ids":["https://openalex.org/I110273157"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5074046030"],"corresponding_institution_ids":["https://openalex.org/I110273157"],"apc_list":null,"apc_paid":null,"fwci":1.355,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.86162928,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/affine-transformation","display_name":"Affine transformation","score":0.6348657011985779},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4977574646472931},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.49358999729156494},{"id":"https://openalex.org/keywords/quadratic-equation","display_name":"Quadratic equation","score":0.48859554529190063},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4593544006347656},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.43590739369392395},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.41834113001823425},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4042162001132965},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.401636004447937},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.34777870774269104},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33465781807899475},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.22421053051948547},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14543411135673523},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.10994994640350342}],"concepts":[{"id":"https://openalex.org/C92757383","wikidata":"https://www.wikidata.org/wiki/Q382497","display_name":"Affine transformation","level":2,"score":0.6348657011985779},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4977574646472931},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.49358999729156494},{"id":"https://openalex.org/C129844170","wikidata":"https://www.wikidata.org/wiki/Q41299","display_name":"Quadratic equation","level":2,"score":0.48859554529190063},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4593544006347656},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.43590739369392395},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.41834113001823425},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4042162001132965},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.401636004447937},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.34777870774269104},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33465781807899475},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.22421053051948547},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14543411135673523},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.10994994640350342},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:doaj.org/article:e41842f602bf48afbe22bfc9dd913dbe","is_oa":true,"landing_page_url":"https://doaj.org/article/e41842f602bf48afbe22bfc9dd913dbe","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 3 (2018)","raw_type":"article"},{"id":"doi:10.13154/tches.v2018.i3.500-523","is_oa":true,"landing_page_url":"https://doi.org/10.13154/tches.v2018.i3.500-523","pdf_url":null,"source":{"id":"https://openalex.org/S7407052971","display_name":"UB Bochum","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:doaj.org/article:e41842f602bf48afbe22bfc9dd913dbe","is_oa":true,"landing_page_url":"https://doaj.org/article/e41842f602bf48afbe22bfc9dd913dbe","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 3 (2018)","raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3116367236","https://openalex.org/W4287831822","https://openalex.org/W2974599773","https://openalex.org/W3031338578","https://openalex.org/W4200296760","https://openalex.org/W2959588354","https://openalex.org/W2912785840","https://openalex.org/W4200295842","https://openalex.org/W4210313059","https://openalex.org/W4206085476"],"abstract_inverted_index":{"In":[0,83],"this":[1,84,142],"paper,":[2],"we":[3,51,105,130],"investigate":[4],"the":[5,24,42,86,90,95,98,107,113,169,172,182,185,189,194,198],"security":[6,199],"of":[7,23,56,89,97,168,171,188,200],"Rainbow":[8,69,145],"and":[9,61,176,218],"Unbalanced":[10],"Oil-and-Vinegar":[11],"(UOV)":[12],"signature":[13,30,204],"schemes":[14,43,166,180,205,217,222],"based":[15],"on":[16,41,144,150,197],"multivariate":[17,201],"quadratic":[18,202],"equations,":[19],"which":[20],"is":[21,70,193],"one":[22],"most":[25],"promising":[26],"alternatives":[27],"for":[28,80,226],"post-quantum":[29],"schemes,":[31],"against":[32],"side-channel":[33],"attacks.":[34,138],"We":[35,139],"describe":[36],"correlation":[37],"power":[38],"analysis":[39],"(CPA)":[40],"that":[44],"yield":[45],"full":[46,108],"secret":[47,54,57,100,109],"key":[48,110,136],"recoveries.":[49],"First,":[50],"identify":[52],"a":[53,121],"leakage":[55,143],"affine":[58,78,101,118],"maps":[59,79,119],"S":[60,126],"T":[62,132],"during":[63],"matrix-vector":[64],"products":[65],"in":[66],"signing":[67],"when":[68],"implemented":[71],"with":[72,181],"equivalent":[73,91,174,186],"keys":[74,92,175,187],"rather":[75],"than":[76],"random":[77,117],"optimal":[81],"implementations.":[82],"case,":[85],"simple":[87,190],"structure":[88],"leads":[93],"to":[94,112,163,214,224],"retrieval":[96],"entire":[99],"map":[102],"T.":[103],"Next,":[104],"extend":[106],"recovery":[111,137],"general":[114],"case":[115],"using":[116,155,184,206],"via":[120],"hybrid":[122],"attack:":[123],"after":[124],"recovering":[125],"by":[127,133],"performing":[128],"CPA,":[129],"recover":[131],"mounting":[134],"algebraic":[135],"demonstrate":[140],"how":[141],"can":[146,160,211],"be":[147,161,212],"practically":[148],"exploited":[149],"an":[151],"8-bit":[152],"AVR":[153],"microcontroller":[154],"CPA.":[156,208],"Consequently,":[157],"our":[158],"CPA":[159],"applied":[162,213],"Rainbow-like":[164,215],"multi-layered":[165,216],"regardless":[167],"use":[170],"simple-structured":[173],"UOV-like":[177,219],"single":[178,220],"layer":[179,221],"implementations":[183],"structure.":[191],"This":[192],"first":[195],"result":[196,210],"equations-based":[203],"only":[207],"Our":[209],"submitted":[223],"NIST":[225],"Post-Quantum":[227],"Cryptography":[228],"Standardization.":[229]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
