{"id":12159,"date":"2025-12-03T09:00:06","date_gmt":"2025-12-03T08:00:06","guid":{"rendered":"https:\/\/talentimpulse.cea.fr\/offre-emploi\/cryptanalyse-assistee-par-attaques-physiques-pour-les-schemas-bases-sur-les-codes-correcteurs-derreurs\/"},"modified":"2026-03-02T09:00:07","modified_gmt":"2026-03-02T08:00:07","slug":"cryptanalyse-assistee-par-attaques-physiques-pour-les-schemas-bases-sur-les-codes-correcteurs-derreurs","status":"publish","type":"offre-emploi","link":"https:\/\/talentimpulse.cea.fr\/en\/offre-emploi\/cryptanalyse-assistee-par-attaques-physiques-pour-les-schemas-bases-sur-les-codes-correcteurs-derreurs\/","title":{"rendered":"Physical-attack-assisted cryptanalysis for error-correcting code-based schemes"},"content":{"rendered":"<p>The security assessment of post-quantum cryptography, from the perspective of physical attacks, has been extensively studied in the literature, particularly with regard to the ML-KEM and ML-DSA standards, which are based on Euclidean lattices. Furthermore, in March 2025, the HQC scheme, based on error-correcting codes, was standardized as an alternative key encapsulation mechanism to ML-KEM. Recently, Soft-Analytical Side-Channel Attacks (SASCA) have been used on a wide variety of algorithms to combine information related to intermediate variables in order to trace back to the secret, providing a form of \u201ccorrection\u201d to the uncertainty associated with profiled attacks. SASCA is based on probabilistic models called \u201cfactor graphs,\u201d to which a \u201cbelief propagation\u201d algorithm is applied. In the case of attacks on post-quantum cryptosystems, it is theoretically possible to use the underlying mathematical structure to process the output of a SASCA attack in the form of cryptanalysis. This has been demonstrated, for example, on ML-KEM. The objective of this thesis is to develop a methodology and the necessary tools for cryptanalysis and residual complexity calculation for cryptography based on error-correcting codes. These tools will need to take into account information (\u201chints\u201d) obtained from a physical attack. A second part of the thesis will be to study the impact that this type of tool can have on the design of countermeasures.<\/p>","protected":false},"featured_media":0,"template":"","categories":[188],"tags":[],"class_list":["post-12159","offre-emploi","type-offre-emploi","status-publish","hentry","category-cybersecurite-hardware-et-software"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/talentimpulse.cea.fr\/en\/wp-json\/wp\/v2\/offre-emploi\/12159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/talentimpulse.cea.fr\/en\/wp-json\/wp\/v2\/offre-emploi"}],"about":[{"href":"https:\/\/talentimpulse.cea.fr\/en\/wp-json\/wp\/v2\/types\/offre-emploi"}],"wp:attachment":[{"href":"https:\/\/talentimpulse.cea.fr\/en\/wp-json\/wp\/v2\/media?parent=12159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/talentimpulse.cea.fr\/en\/wp-json\/wp\/v2\/categories?post=12159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/talentimpulse.cea.fr\/en\/wp-json\/wp\/v2\/tags?post=12159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}