Stefan Gast<p>I had the pleasure to contribute to the <a href="https://infosec.exchange/tags/USENIX2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USENIX2024</span></a> paper "Divide and Surrender", recovering the full secret key from the reference implementation of the HQC Key Encapsulation Mechanism, exploiting a timing side channel arising from non-constant-time modulo operations.<br>Thanks to Robin Leander Schröder and Qian Guo for this opportunity and congratulations to Robin Leander Schröder for getting his first paper accepted at USENIX Security!</p><p>You can read the full paper here: <a href="https://stefangast.eu/papers/divide_and_surrender.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">stefangast.eu/papers/divide_an</span><span class="invisible">d_surrender.pdf</span></a></p><p><a href="https://infosec.exchange/tags/divideandsurrender" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>divideandsurrender</span></a> <a href="https://infosec.exchange/tags/hqc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hqc</span></a> <a href="https://infosec.exchange/tags/sidechannel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sidechannel</span></a> <a href="https://infosec.exchange/tags/postquantumcrypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>postquantumcrypto</span></a> <a href="https://infosec.exchange/tags/usenixsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usenixsecurity</span></a></p>