About us
Espace utilisateur
Education
INSTN offers more than 40 diplomas from operator level to post-graduate degree level. 30% of our students are international students.
Professionnal development
Professionnal development
Find a training course
INSTN delivers off-the-self or tailor-made training courses to support the operational excellence of your talents.
Human capital solutions
At INSTN, we are committed to providing our partners with the best human capital solutions to develop and deliver safe & sustainable projects.
Thesis
Home   /   Post Doctorat   /   Secure Implementations of Code-Based Post-Quantum Cryptography: Software-Hardware Co-Design and Side-Channel Resistance

Secure Implementations of Code-Based Post-Quantum Cryptography: Software-Hardware Co-Design and Side-Channel Resistance

Computer science and software Cyber security : hardware and sofware Engineering sciences Technological challenges

Abstract

Quantum computing threatens traditional cryptographic schemes like RSA and ECC, prompting the need for post-quantum cryptography (PQC). NIST’s standardization process selected algorithms like HQC, a code-based Key Encapsulation Mechanism. Efficient and secure implementation of these algorithms, especially in resource-constrained environments such as IoT and embedded systems, remains a challenge. Physical attacks, particularly side-channel and fault injection attacks, require robust countermeasures like masking, shuffling, and hiding. These protections, however, introduce performance overhead, making hardware/software co-design essential. The project focuses on the secure software implementation of HQC with strong resistance to physical attacks. Target platforms include RISC-V embedded systems. The research involves designing and evaluating side-channel countermeasures on these platforms. Later phases will extend the work to FPGA prototypes for validating security in hardware. ASIC design may follow to optimize area, power, and performance while maintaining security. The candidate will also develop algorithmic and architectural techniques for attack mitigation. Contributions will include open-source tools and benchmarking. The work will support secure deployment of PQC in real-world applications.

Laboratory

Département Systèmes (LETI)
Service Sécurité des Systèmes Electroniques et des Composants
Laboratoire de Sécurité des COmposants
Top envelopegraduation-hatlicensebookuserusersmap-markercalendar-fullbubblecrossmenuarrow-down