Misuse attacks on post-quantum cryptosystems
From MaRDI portal
Publication:2292893
DOI10.1007/978-3-030-17656-3_26OpenAlexW2946106366MaRDI QIDQ2292893
Loïs Huguenin-Dumittan, Ciprian Băetu, Serge Vaudenay, Abdullah Talayhan, Fatma Betül Durak
Publication date: 6 February 2020
Full work available at URL: http://eprint.iacr.org/2019/525
Cryptography (94A60) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94) Quantum state tomography, quantum state discrimination (81P18) Quantum channels, fidelity (81P47)
Related Items (11)
Key mismatch attack on ThreeBears, Frodo and Round5 ⋮ Small leaks sink a great ship: an evaluation of key reuse resilience of PQC third round finalist NTRU-HRSS ⋮ A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs ⋮ Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates ⋮ A power side-channel attack on the Reed-Muller Reed-Solomon version of the HQC cryptosystem ⋮ A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack ⋮ A new decryption failure attack against HQC ⋮ Recovery attack on Bob's reused randomness in CRYSTALS-KYBER and SABER ⋮ Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes ⋮ (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes ⋮ A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
This page was built for publication: Misuse attacks on post-quantum cryptosystems