Mathematical Research Data Initiative
Main page
Recent changes
Random page
Help about MediaWiki
Create a new Item
Create a new Property
Create a new EntitySchema
Merge two items
In other projects
Discussion
View source
View history
Purge
English
Log in

Recovery attack on Bob's reused randomness in CRYSTALS-KYBER and SABER

From MaRDI portal
Publication:2697918
Jump to:navigation, search

DOI10.1007/978-3-030-90402-9_9OpenAlexW3208460066MaRDI QIDQ2697918

Satoshi Okada, Yun-Tao Wang

Publication date: 13 April 2023

Full work available at URL: https://doi.org/10.1007/978-3-030-90402-9_9


zbMATH Keywords

PQCCRYSTALS-KYBERmeta-PKErandomness reuse attackSABER


Mathematics Subject Classification ID

Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)



Uses Software

  • Saber


Cites Work

  • Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
  • Key reuse attack on NewHope key exchange protocol
  • Complete attack on RLWE key exchange with reused keys, without signal leakage
  • Improving key mismatch attack on NewHope with fewer queries
  • Assessment of the key-reuse resilience of NewHope
  • Misuse attacks on post-quantum cryptosystems
  • Security of two NIST candidates in the presence of randomness reuse
  • On Ideal Lattices and Learning with Errors over Rings
  • Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer


This page was built for publication: Recovery attack on Bob's reused randomness in CRYSTALS-KYBER and SABER

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:2697918&oldid=15543107"
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information
MaRDI portal item
This page was last edited on 3 February 2024, at 11:58.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki