Lattice Klepto -- turning post-quantum crypto against itself
From MaRDI portal
Publication:1746980
DOI10.1007/978-3-319-72565-9_17zbMATH Open1384.94077OpenAlexW3200006398MaRDI QIDQ1746980FDOQ1746980
Authors: Robin Kwant, Tanja Lange, Kimberley Thissen
Publication date: 26 April 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-72565-9_17
Recommendations
- Post-quantum cryptography: lattice identification schemes
- Post-quantum cryptography: lattice signatures
- Post-quantum insecurity from LWE
- scientific article; zbMATH DE number 6823399
- Chosen ciphertext attacks on lattice-based public key encryption and modern cryptography in a quantum environment
- Lattice-based completely non-malleable public-key encryption in the standard model
- Post-quantum security on the Lai-Massey scheme
Cites Work
Cited In (5)
- Lizard: cut off the tail -- a practical post-quantum public-key encryption from LWE and LWR
- Subliminal Hash Channels
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- How to backdoor (classic) McEliece and how to guard against backdoors
- Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption
This page was built for publication: Lattice Klepto -- turning post-quantum crypto against itself
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1746980)