Lattice Klepto -- turning post-quantum crypto against itself
From MaRDI portal
(Redirected from Publication:1746980)
Recommendations
- Post-quantum cryptography: lattice identification schemes
- Post-quantum cryptography: lattice signatures
- Post-quantum insecurity from LWE
- scientific article; zbMATH DE number 6823399
- Chosen ciphertext attacks on lattice-based public key encryption and modern cryptography in a quantum environment
- Lattice-based completely non-malleable public-key encryption in the standard model
- Post-quantum security on the Lai-Massey scheme
Cites work
- scientific article; zbMATH DE number 1722680 (Why is no real title available?)
- scientific article; zbMATH DE number 1186948 (Why is no real title available?)
- scientific article; zbMATH DE number 1962147 (Why is no real title available?)
- Code-based cryptography
- Dual EC: a standardized back door
- Kleptography from standard assumptions and applications
- Transcript secure signatures based on modular lattices
Cited in
(5)- Lizard: cut off the tail -- a practical post-quantum public-key encryption from LWE and LWR
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption
- How to backdoor (classic) McEliece and how to guard against backdoors
- Subliminal hash channels
This page was built for publication: Lattice Klepto -- turning post-quantum crypto against itself
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1746980)