Small leaks sink a great ship: an evaluation of key reuse resilience of PQC third round finalist NTRU-HRSS
From MaRDI portal
Publication:2673059
DOI10.1007/978-3-030-88052-1_17zbMath1501.94061OpenAlexW3144672608MaRDI QIDQ2673059
Ruoyu Ding, Chi Cheng, Xiaohan Zhang
Publication date: 8 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-88052-1_17
Related Items
Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates, A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Complete attack on RLWE key exchange with reused keys, without signal leakage
- Improving key mismatch attack on NewHope with fewer queries
- Assessment of the key-reuse resilience of NewHope
- Misuse attacks on post-quantum cryptosystems
- Worst-case to average-case reductions for module lattices
- On Ideal Lattices and Learning with Errors over Rings
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- High-Speed Key Encapsulation from NTRU