“…In order to have such an oracle, someone has to apply a side channel attack, hoping to get some information about the vector c of Proposition 3.1. Then, the attacker may have a good guess for the vector E. For instance, side channel attacks were studied in [4,23,36,38]. Finally, we provided several examples showing the success of the attack with the use of the oracle.…”