Decryption failure attacks on IND-CCA secure lattice-based schemes
From MaRDI portal
Publication:2289446
DOI10.1007/978-3-030-17259-6_19OpenAlexW2933681094MaRDI QIDQ2289446FDOQ2289446
Authors: Jan-Pieter D'Anvers, Qian Guo, Thomas Johansson, Alexander Nilsson, Frederik Vercauteren, Ingrid Verbauwhede
Publication date: 28 January 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-17259-6_19
Recommendations
- Multitarget decryption failure attacks and their application to Saber and Kyber
- Decryption failure is more likely after success
- (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes
- More accurate geometric analysis on the impact of successful decryptions for IND-CCA secure Ring/Mod-LWE/LWR based schemes
- A novel CCA attack using decryption errors against LAC
Cited In (20)
- SoK: how (not) to design and implement post-quantum cryptography
- Ciphertext-only attacks against compact-LWE submitted to NIST PQC project
- Exploring decryption failures of BIKE: new class of weak keys and key recovery attacks
- HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction
- Transciphering, using FiLIP and TFHE for an efficient delegation of computation
- (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes
- A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
- A novel CCA attack using decryption errors against LAC
- The impact of error dependencies on Ring/Mod-LWE/LWR based schemes
- Multitarget decryption failure attacks and their application to Saber and Kyber
- Decryption failure is more likely after success
- More accurate geometric analysis on the impact of successful decryptions for IND-CCA secure Ring/Mod-LWE/LWR based schemes
- A new decryption failure attack against HQC
- Revisiting security estimation for LWE with hints from a geometric perspective
- \textsf{SMAUG}: pushing lattice-based key encapsulation mechanisms to the limits
- Failing gracefully: decryption failures and the Fujisaki-Okamoto transform
- \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption
- Provable security against decryption failure attacks from LWE
- Tight Analysis of Decryption Failure Probability of Kyber in Reality
- Do Not Bound to a Single Position: Near-Optimal Multi-positional Mismatch Attacks Against Kyber and Saber
This page was built for publication: Decryption failure attacks on IND-CCA secure lattice-based schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2289446)