Mathematical Research Data Initiative
Main page
Recent changes
Random page
Help about MediaWiki
Create a new Item
Create a new Property
Merge two items
In other projects
Discussion
View source
View history
Purge
English
Log in

Complete attack on RLWE key exchange with reused keys, without signal leakage

From MaRDI portal
Publication:1784478
Jump to:navigation, search

DOI10.1007/978-3-319-93638-3_27zbMath1444.94063OpenAlexW2795139011MaRDI QIDQ1784478

Saraswathy Rv, Jintai Ding, Scott Fluhrer

Publication date: 26 September 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-93638-3_27


zbMATH Keywords

active attackskey exchangekey reusepost quantumRing-Learning with Errors (RLWE)


Mathematics Subject Classification ID

Cryptography (94A60)


Related Items (8)

Towards post-quantum security for signal's X3DH handshake ⋮ Improved attacks against key reuse in learning with errors key exchange ⋮ Small leaks sink a great ship: an evaluation of key reuse resilience of PQC third round finalist NTRU-HRSS ⋮ A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs ⋮ A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack ⋮ Revisiting security estimation for LWE with hints from a geometric perspective ⋮ Recovery attack on Bob's reused randomness in CRYSTALS-KYBER and SABER ⋮ On removing rejection conditions in practical lattice-based signatures







This page was built for publication: Complete attack on RLWE key exchange with reused keys, without signal leakage

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:1784478&oldid=14142262"
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information
MaRDI portal item
This page was last edited on 1 February 2024, at 08:20.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki