A key-recovery attack against Mitaka in the \(t\)-probing model (Q6091134): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-031-31368-4_8 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W4367663775 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revisiting the expected cost of solving uSVP and applications to LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Masking the GLP lattice-based signature scheme at any order / rank
 
Normal rank
Property / cites work
 
Property / cites work: LWE with side information: attacks and concrete security estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version / rank
 
Normal rank
Property / cites work
 
Property / cites work: \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon} / rank
 
Normal rank
Property / cites work
 
Property / cites work: The nearest-colattice algorithm: Time-approximation tradeoff for approx-CVP / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4797801 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for hard lattices and new cryptographic constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: More efficient algorithms for the NTRU key generation using the field norm / rank
 
Normal rank

Latest revision as of 14:22, 19 August 2024

scientific article; zbMATH DE number 7770256
Language Label Description Also known as
English
A key-recovery attack against Mitaka in the \(t\)-probing model
scientific article; zbMATH DE number 7770256

    Statements

    A key-recovery attack against Mitaka in the \(t\)-probing model (English)
    0 references
    0 references
    24 November 2023
    0 references
    \textsc{Mitaka}
    0 references
    \(t\)-probing model
    0 references
    cryptanalysis
    0 references

    Identifiers