A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
From MaRDI portal
Publication:6041281
DOI10.1007/978-3-030-92068-5_4zbMath1514.94126OpenAlexW3202783877MaRDI QIDQ6041281
Chi Cheng, Jintai Ding, Xiaohan Zhang, Lei Hu, Yanbin Pan, Yue Qin
Publication date: 26 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-92068-5_4
Cryptography (94A60) Measures of information, entropy (94A17) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (2)
A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack ⋮ Revisiting security estimation for LWE with hints from a geometric perspective
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Nearly optimal binary search trees
- HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction
- Key reuse attack on NewHope key exchange protocol
- NTRU prime: reducing attack surface at low cost
- Complete attack on RLWE key exchange with reused keys, without signal leakage
- Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes
- Assessment of the key-reuse resilience of NewHope
- Misuse attacks on post-quantum cryptosystems
- On reusing ephemeral keys in Diffie-Hellman key agreement protocols
- Key recovery under plaintext checking attack on LAC
- Lattice Cryptography for the Internet
- On Ideal Lattices and Learning with Errors over Rings
- New directions in cryptography
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Secure integration of asymmetric and symmetric encryption schemes
- A Method for the Construction of Minimum-Redundancy Codes
- On lattices, learning with errors, random linear codes, and cryptography
This page was built for publication: A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs