A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
DOI10.1007/978-3-030-92068-5_4zbMATH Open1514.94126OpenAlexW3202783877MaRDI QIDQ6041281FDOQ6041281
Authors: Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding
Publication date: 26 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-92068-5_4
Recommendations
- Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje
- A Ciphertext-Only Attack Against the Cai-Cusick Lattice-Based Public-Key Cryptosystem
- A probabilistic analysis on a lattice attack against DSA
- A New Lattice Construction for Partial Key Exposure Attack for RSA
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
- Two lattice-based differential fault attacks against ECDSA with \(w\)NAF algorithm
- Partial key exposure attack on RSA -- improvements for limited lattice dimensions
- A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice
Measures of information, entropy (94A17) Cryptography (94A60) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Title not available (Why is that?)
- On ideal lattices and learning with errors over rings
- Title not available (Why is that?)
- New directions in cryptography
- Title not available (Why is that?)
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Secure integration of asymmetric and symmetric encryption schemes
- On lattices, learning with errors, random linear codes, and cryptography
- A Method for the Construction of Minimum-Redundancy Codes
- Title not available (Why is that?)
- Nearly optimal binary search trees
- Lattice cryptography for the internet
- HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction
- Key reuse attack on NewHope key exchange protocol
- Complete attack on RLWE key exchange with reused keys, without signal leakage
- Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes
- Assessment of the key-reuse resilience of NewHope
- Misuse attacks on post-quantum cryptosystems
- NTRU prime: reducing attack surface at low cost
- Key recovery under plaintext checking attack on LAC
- On reusing ephemeral keys in Diffie-Hellman key agreement protocols
Cited In (9)
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
- Improving key mismatch attack on NewHope with fewer queries
- A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack
- Post-quantum security of key encapsulation mechanism against CCA attacks with a single decapsulation query
- SCA-LDPC: a code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes
- Revisiting security estimation for LWE with hints from a geometric perspective
- Bit security analysis of lattice-based KEMs under plaintext-checking attacks
- Do Not Bound to a Single Position: Near-Optimal Multi-positional Mismatch Attacks Against Kyber and Saber
- Side-channel analysis on lattice-based KEM using multi-feature recognition -- the case study of Kyber
This page was built for publication: A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6041281)