This is some code for simulating the performance of using soft decoding techniques for improving side channel attacks (SCA) on the Fujisaka Okomoto transform (FO) on Post Quantum Cryptography primitives (PQC). This code accompanies the paper "SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-quantum Encryption Schemes" (https://link.springer.com/chapter/10.1007/978-981-99-8730-6_7)
Before running the script main.py
please ensure that you are running in a virtual environment by executing
cd simulate-with-python
source setup-environment.sh
Afterwards the scripts in the simulate-with-python
can be executed while being certain you are using the same dependencies as specified in requirements.txt
This is just for experimentation, there is nothing concrete here yet. There might never be. It might never be necessary to use rust for these simulations.