Lattice Klepto -- turning post-quantum crypto against itself
From MaRDI portal
Publication:1746980
DOI10.1007/978-3-319-72565-9_17zbMATH Open1384.94077OpenAlexW3200006398MaRDI QIDQ1746980FDOQ1746980
Kimberley Thissen, Tanja Lange, Robin Kwant
Publication date: 26 April 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-72565-9_17
Cites Work
Cited In (5)
- Lizard: cut off the tail -- a practical post-quantum public-key encryption from LWE and LWR
- Subliminal Hash Channels
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- How to backdoor (classic) McEliece and how to guard against backdoors
- Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption
Recommendations
- Post-quantum cryptography: lattice identification schemes π π
- Post-quantum cryptography: lattice signatures π π
- Post-quantum insecurity from LWE π π
- Title not available (Why is that?) π π
- Chosen ciphertext attacks on lattice-based public key encryption and modern cryptography in a quantum environment π π
- Lattice-based completely non-malleable public-key encryption in the standard model π π
- Post-quantum security on the Lai-Massey scheme π π
This page was built for publication: Lattice Klepto -- turning post-quantum crypto against itself
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1746980)