BIKE key-recovery: combining power consumption analysis and information-set decoding
DOI10.1007/978-3-031-33488-7_27zbMATH Open1542.94114MaRDI QIDQ6535101FDOQ6535101
Authors: Agathe Cheriere, Nicolas Aragon, Tania Richmond, Benoit Gerard
Publication date: 9 November 2023
Recommendations
- Partial key exposure attacks on BIKE, Rainbow and NTRU
- Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4
- Preventing potential backdoors in BIKE algorithm
- Exploring decryption failures of BIKE: new class of weak keys and key recovery attacks
- A new key recovery side-channel attack on HQC with chosen ciphertext
information-set decodingside-channel attackkey recoveryQC-MDPC codesPQCBIKEpower consumption analysis
Classification and discrimination; cluster analysis (statistical aspects) (62H30) Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Factorization (11Y05) Quantum cryptography (quantum-theoretic aspects) (81P94) Decoding (94B35)
Cites Work
- Title not available (Why is that?)
- A method for obtaining digital signatures and public-key cryptosystems
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Title not available (Why is that?)
- On the inherent intractability of certain coding problems (Corresp.)
- A side-channel assisted cryptanalytic attack against \textsf{QcBits}
- Fast polynomial inversion for post quantum QC-MDPC cryptography
- Information-set decoding with hints
This page was built for publication: BIKE key-recovery: combining power consumption analysis and information-set decoding
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6535101)