Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes
From MaRDI portal
Publication:2229273
DOI10.1007/978-3-030-57808-4_11OpenAlexW3082551154MaRDI QIDQ2229273
Serge Vaudenay, Loïs Huguenin-Dumittan
Publication date: 23 February 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-57808-4_11
Related Items
Key mismatch attack on ThreeBears, Frodo and Round5, A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs, On optimizing electricity markets performance, Systematic study of decryption and re-encryption leakage: the case of Kyber, Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates, A power side-channel attack on the Reed-Muller Reed-Solomon version of the HQC cryptosystem, A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack, Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Notions of computation and monads
- Theory of codes with maximum rank distance
- Sheaves in geometry and logic: a first introduction to topos theory
- HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction
- A modular analysis of the Fujisaki-Okamoto transformation
- Secure integration of asymmetric and symmetric encryption schemes
- Axiomatic method and category theory
- Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes
- A reaction attack against cryptosystems based on LRPC codes
- Assessment of the key-reuse resilience of NewHope
- Misuse attacks on post-quantum cryptosystems
- Preventing timing attacks against RQC using constant time decoding of Gabidulin codes
- From a geometrical point of view. A study of the history and philosophy of category theory
- Rethinking Set Theory
- A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- The Uses and Abuses of the History of Topos Theory
- Extraction in Coq: An Overview
- Data types à la carte
- Asymptotic Improvement of Computations over Free Monads
- Categorical semantics for higher order polymorphic lambda calculus
- Category Theory as an Autonomous Foundation
- Homotopy Type Theory: Univalent Foundations of Mathematics
- Advances in Cryptology - CRYPTO 2003