Multitarget decryption failure attacks and their application to Saber and Kyber
From MaRDI portal
Publication:5087247
DOI10.1007/978-3-030-97121-2_1zbMATH Open1492.94087OpenAlexW3150013997MaRDI QIDQ5087247FDOQ5087247
Authors: Jan-Pieter D'Anvers, Senne Batsleer
Publication date: 8 July 2022
Published in: Public-Key Cryptography – PKC 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-97121-2_1
Recommendations
- Decryption failure attacks on IND-CCA secure lattice-based schemes
- (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes
- Decryption failure is more likely after success
- More accurate geometric analysis on the impact of successful decryptions for IND-CCA secure Ring/Mod-LWE/LWR based schemes
- Tight Analysis of Decryption Failure Probability of Kyber in Reality
Cites Work
- Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
- On ideal lattices and learning with errors over rings
- On lattices, learning with errors, random linear codes, and cryptography
- Trapdoors for hard lattices and new cryptographic constructions
- Secure integration of asymmetric and symmetric encryption schemes
- An improved compression technique for signatures based on learning with errors
- Fiat-Shamir with aborts: applications to lattice and factoring-based signatures
- Worst-case to average-case reductions for module lattices
- Pseudorandom functions and lattices
- On the concrete hardness of learning with errors
- A modular analysis of the Fujisaki-Okamoto transformation
- Estimate all the \(\{\)LWE, NTRU\(\}\) schemes!
- (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes
- LWE with side information: attacks and concrete security estimation
- A novel CCA attack using decryption errors against LAC
- The impact of error dependencies on Ring/Mod-LWE/LWR based schemes
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- Title not available (Why is that?)
- Cryptography and Coding
- Decryption failure is more likely after success
Cited In (9)
- Exploring decryption failures of BIKE: new class of weak keys and key recovery attacks
- (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes
- Decryption failure attacks on IND-CCA secure lattice-based schemes
- Decryption failure is more likely after success
- More accurate geometric analysis on the impact of successful decryptions for IND-CCA secure Ring/Mod-LWE/LWR based schemes
- \textsf{SMAUG}: pushing lattice-based key encapsulation mechanisms to the limits
- Systematic study of decryption and re-encryption leakage: the case of Kyber
- Fault-enabled chosen-ciphertext attacks on Kyber
- Tight Analysis of Decryption Failure Probability of Kyber in Reality
Uses Software
This page was built for publication: Multitarget decryption failure attacks and their application to Saber and Kyber
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5087247)