Pages that link to "Item:Q2096530"
From MaRDI portal
The following pages link to A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM (Q2096530):
Displaying 5 items.
- SoK: how (not) to design and implement post-quantum cryptography (Q826276) (← links)
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors (Q2692341) (← links)
- Side-channel analysis on lattice-based KEM using multi-feature recognition -- the case study of Kyber (Q6547870) (← links)
- SCA-LDPC: a code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes (Q6604875) (← links)
- Formally verifying Kyber. Episode V: machine-checked IND-CCA security and correctness of ML-KEM in Easycrypt (Q6648215) (← links)