Mathematical Research Data Initiative
Main page
Recent changes
Random page
Help about MediaWiki
Create a new Item
Create a new Property
Create a new EntitySchema
Merge two items
In other projects
Discussion
View source
View history
Purge
English
Log in

A key-recovery attack against Mitaka in the \(t\)-probing model

From MaRDI portal
Publication:6091134
Jump to:navigation, search

DOI10.1007/978-3-031-31368-4_8zbMath1527.94060OpenAlexW4367663775MaRDI QIDQ6091134

Thomas Prest

Publication date: 24 November 2023

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-031-31368-4_8

zbMATH Keywords

cryptanalysis\(t\)-probing model\textsc{Mitaka}


Mathematics Subject Classification ID

Cryptography (94A60)




Cites Work

  • Unnamed Item
  • Unnamed Item
  • Masking the GLP lattice-based signature scheme at any order
  • Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
  • LWE with side information: attacks and concrete security estimation
  • \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}
  • More efficient algorithms for the NTRU key generation using the field norm
  • Revisiting the expected cost of solving uSVP and applications to LWE
  • RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
  • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
  • Trapdoors for hard lattices and new cryptographic constructions
  • Advances in Cryptology - CRYPTO 2003
  • The nearest-colattice algorithm: Time-approximation tradeoff for approx-CVP
Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:6091134&oldid=35533606"
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information
MaRDI portal item
This page was last edited on 10 July 2024, at 07:06.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki