Key mismatch attack on ThreeBears, Frodo and Round5
From MaRDI portal
Publication:831649
DOI10.1007/978-3-030-68890-5_10OpenAlexW3128909628MaRDI QIDQ831649FDOQ831649
Authors: Jan Vacek, Jan Václavek
Publication date: 24 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-68890-5_10
Cites Work
- Pseudorandom functions and lattices
- HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction
- Improving key mismatch attack on NewHope with fewer queries
- Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes
- Assessment of the key-reuse resilience of NewHope
- Misuse attacks on post-quantum cryptosystems
- Integer version of ring-LWE and its applications
Cited In (2)
Uses Software
This page was built for publication: Key mismatch attack on ThreeBears, Frodo and Round5
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q831649)