Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes (Q2229273): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-57808-4_11 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3082551154 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Misuse attacks on post-quantum cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Assessment of the key-reuse resilience of NewHope / rank
 
Normal rank
Property / cites work
 
Property / cites work: HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Preventing timing attacks against RQC using constant time decoding of Gabidulin codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249316 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure integration of asymmetric and symmetric encryption schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure integration of asymmetric and symmetric encryption schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of codes with maximum rank distance / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4945380 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A modular analysis of the Fujisaki-Okamoto transformation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4050723 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A reaction attack against cryptosystems based on LRPC codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4807625 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5193160 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4679166 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rethinking Set Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Extraction in Coq: An Overview / rank
 
Normal rank
Property / cites work
 
Property / cites work: Category Theory as an Autonomous Foundation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sheaves in geometry and logic: a first introduction to topos theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: From a geometrical point of view. A study of the history and philosophy of category theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3372677 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Uses and Abuses of the History of Topos Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5040164 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Notions of computation and monads / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4117991 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5559220 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Axiomatic method and category theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Categorical semantics for higher order polymorphic lambda calculus / rank
 
Normal rank
Property / cites work
 
Property / cites work: Data types à la carte / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homotopy Type Theory: Univalent Foundations of Mathematics / rank
 
Normal rank
Property / cites work
 
Property / cites work: Asymptotic Improvement of Computations over Free Monads / rank
 
Normal rank

Latest revision as of 16:31, 24 July 2024

scientific article
Language Label Description Also known as
English
Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes
scientific article

    Statements

    Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes (English)
    0 references
    0 references
    23 February 2021
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers