Assessment of the key-reuse resilience of NewHope
From MaRDI portal
Publication:2290456
DOI10.1007/978-3-030-12612-4_14zbMath1464.94027OpenAlexW2914825969MaRDI QIDQ2290456
Aurélie Bauer, Mélissa Rossi, Guénaël Renault, Henri Gilbert
Publication date: 28 January 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-12612-4_14
Related Items (11)
Key mismatch attack on ThreeBears, Frodo and Round5 ⋮ Towards post-quantum security for signal's X3DH handshake ⋮ Small leaks sink a great ship: an evaluation of key reuse resilience of PQC third round finalist NTRU-HRSS ⋮ A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs ⋮ Fault-enabled chosen-ciphertext attacks on Kyber ⋮ Revisiting security estimation for LWE with hints from a geometric perspective ⋮ CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors ⋮ A new decryption failure attack against HQC ⋮ Recovery attack on Bob's reused randomness in CRYSTALS-KYBER and SABER ⋮ Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes ⋮ A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
This page was built for publication: Assessment of the key-reuse resilience of NewHope