A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors
From MaRDI portal
Publication:2958147
DOI10.1007/978-3-662-53887-6_29zbMath1404.94079OpenAlexW2520683369WikidataQ62041893 ScholiaQ62041893MaRDI QIDQ2958147
Qian Guo, Paul Stankovski, Thomas Johansson
Publication date: 1 February 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53887-6_29
Related Items
SoK: how (not) to design and implement post-quantum cryptography, About Low DFR for QC-MDPC Decoding, Performance bounds for QC-MDPC codes decoders, Assessing and Countering Reaction Attacks Against Post-Quantum Public-Key Cryptosystems Based on QC-LDPC Codes, A study of error floor behavior in QC-MDPC codes, Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures, Exploring decryption failures of BIKE: new class of weak keys and key recovery attacks, Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates, CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors, A new decryption failure attack against HQC, Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation, Quantum Resistant Public Key Encryption Scheme polarRLCE, Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes, Reproducible families of codes and cryptographic applications, NTRU prime: reducing attack surface at low cost, DAGS: key encapsulation using dyadic GS codes, A New Dynamic Code-Based Group Signature Scheme, Rank-Metric Codes and Their Applications, On the design and security of Lee metric McEliece cryptosystems
Uses Software
Cites Work
- IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter
- Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
- Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding
- Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices
- Choosing Parameters for NTRUEncrypt
- Decoding One Out of Many
- Post-Quantum Cryptography
- Code-based cryptography
- On the complexity of some cryptographic problems based on the general decoding problem
- Overview of the Mceliece Cryptosystem and its Security
- Advances in Cryptology - CRYPTO 2003
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item