BIKE key-recovery: combining power consumption analysis and information-set decoding
From MaRDI portal
Publication:6535101
Recommendations
- Partial key exposure attacks on BIKE, Rainbow and NTRU
- Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4
- Preventing potential backdoors in BIKE algorithm
- Exploring decryption failures of BIKE: new class of weak keys and key recovery attacks
- A new key recovery side-channel attack on HQC with chosen ciphertext
Cites work
- scientific article; zbMATH DE number 3174791 (Why is no real title available?)
- scientific article; zbMATH DE number 3340881 (Why is no real title available?)
- A method for obtaining digital signatures and public-key cryptosystems
- A side-channel assisted cryptanalytic attack against \textsf{QcBits}
- Fast polynomial inversion for post quantum QC-MDPC cryptography
- Information-set decoding with hints
- On the inherent intractability of certain coding problems (Corresp.)
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
This page was built for publication: BIKE key-recovery: combining power consumption analysis and information-set decoding
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6535101)