Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes
From MaRDI portal
Publication:2229273
DOI10.1007/978-3-030-57808-4_11OpenAlexW3082551154MaRDI QIDQ2229273
Serge Vaudenay, Loïs Huguenin-Dumittan
Publication date: 23 February 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-57808-4_11
Related Items (12)
Key mismatch attack on ThreeBears, Frodo and Round5 ⋮ A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs ⋮ On optimizing electricity markets performance ⋮ Systematic study of decryption and re-encryption leakage: the case of Kyber ⋮ Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates ⋮ A power side-channel attack on the Reed-Muller Reed-Solomon version of the HQC cryptosystem ⋮ A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack ⋮ Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes ⋮ Attack on LAC Key Exchange in Misuse Situation ⋮ Post-quantum cryptography for healthcare: a number theory based two-factor mutual authentication and key exchange protocol over lattices for TMIS ⋮ Do Not Bound to a Single Position: Near-Optimal Multi-positional Mismatch Attacks Against Kyber and Saber ⋮ Bit security analysis of lattice-based KEMs under plaintext-checking attacks
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Notions of computation and monads
- Theory of codes with maximum rank distance
- Sheaves in geometry and logic: a first introduction to topos theory
- HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction
- A modular analysis of the Fujisaki-Okamoto transformation
- Secure integration of asymmetric and symmetric encryption schemes
- Axiomatic method and category theory
- Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes
- A reaction attack against cryptosystems based on LRPC codes
- Assessment of the key-reuse resilience of NewHope
- Misuse attacks on post-quantum cryptosystems
- Preventing timing attacks against RQC using constant time decoding of Gabidulin codes
- From a geometrical point of view. A study of the history and philosophy of category theory
- Rethinking Set Theory
- A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- The Uses and Abuses of the History of Topos Theory
- Extraction in Coq: An Overview
- Data types à la carte
- Asymptotic Improvement of Computations over Free Monads
- Categorical semantics for higher order polymorphic lambda calculus
- Category Theory as an Autonomous Foundation
- Secure integration of asymmetric and symmetric encryption schemes
- Homotopy Type Theory: Univalent Foundations of Mathematics
- Advances in Cryptology - CRYPTO 2003
This page was built for publication: Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes