Recovery attack on Bob's reused randomness in CRYSTALS-KYBER and SABER
From MaRDI portal
Publication:2697918
DOI10.1007/978-3-030-90402-9_9OpenAlexW3208460066MaRDI QIDQ2697918
Publication date: 13 April 2023
Full work available at URL: https://doi.org/10.1007/978-3-030-90402-9_9
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Uses Software
Cites Work
- Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
- Key reuse attack on NewHope key exchange protocol
- Complete attack on RLWE key exchange with reused keys, without signal leakage
- Improving key mismatch attack on NewHope with fewer queries
- Assessment of the key-reuse resilience of NewHope
- Misuse attacks on post-quantum cryptosystems
- Security of two NIST candidates in the presence of randomness reuse
- On Ideal Lattices and Learning with Errors over Rings
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
This page was built for publication: Recovery attack on Bob's reused randomness in CRYSTALS-KYBER and SABER