Key reuse attack on NewHope key exchange protocol
From MaRDI portal
Recommendations
- Complete attack on RLWE key exchange with reused keys, without signal leakage
- Improved attacks against key reuse in learning with errors key exchange
- Comparison analysis of Ding's RLWE-based key exchange protocol and NewHope variants
- Assessment of the key-reuse resilience of NewHope
- Analysis of two countermeasures against the signal leakage attack
Cited in
(11)- A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
- Towards post-quantum security for signal's X3DH handshake
- A modification proposal for the reconciliation mechanism of the key exchange algorithm NewHope
- One sample ring-LWE with rounding and its application to key exchange
- Complete attack on RLWE key exchange with reused keys, without signal leakage
- Attack on LAC Key Exchange in Misuse Situation
- Assessment of the key-reuse resilience of NewHope
- Comparison analysis of Ding's RLWE-based key exchange protocol and NewHope variants
- On optimizing electricity markets performance
- Recovery attack on Bob's reused randomness in CRYSTALS-KYBER and SABER
- Application of algebraic-ring in key exchange protocol
This page was built for publication: Key reuse attack on NewHope key exchange protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1736048)