Improved attacks against key reuse in learning with errors key exchange
From MaRDI portal
Publication:2146089
Recommendations
- Efficient laconic cryptography from learning with errors
- A key exchange based on the short integer solution problem and the learning with errors problem
- Improving the security of exponential key exchange
- Improving key mismatch attack on NewHope with fewer queries
- From distinguishers to key recovery: improved related-key attacks on Even-Mansour
- Multi-key and multi-input predicate encryption from learning with errors
- Problem of learning with errors and modern cryptosystems
- Complete attack on RLWE key exchange with reused keys, without signal leakage
- Identity-based lossy encryption from learning with errors
- Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption
Cites work
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- scientific article; zbMATH DE number 1775427 (Why is no real title available?)
- An efficient protocol for authenticated key agreement
- Authenticated key exchange from ideal lattices
- Complete attack on RLWE key exchange with reused keys, without signal leakage
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Lattice cryptography for the internet
- New directions in cryptography
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- On ideal lattices and learning with errors over rings
- On lattices, learning with errors, random linear codes, and cryptography
- One-round key exchange in the standard model
- Stronger Security of Authenticated Key Exchange
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Cited in
(8)- Key reuse attack on NewHope key exchange protocol
- Complete attack on RLWE key exchange with reused keys, without signal leakage
- Limits on the efficiency of (ring) LWE-based non-interactive key exchange
- A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack
- A key exchange based on the short integer solution problem and the learning with errors problem
- Limits on the efficiency of (ring) LWE based non-interactive key exchange
- Post-quantum cryptography for healthcare: a number theory based two-factor mutual authentication and key exchange protocol over lattices for TMIS
- Comparison analysis of Ding's RLWE-based key exchange protocol and NewHope variants
This page was built for publication: Improved attacks against key reuse in learning with errors key exchange
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2146089)