An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber
暂无分享,去创建一个
Chi Cheng | Jintai Ding | Yue Qin | Jintai Ding | Yue Qin | Chi Cheng
[1] Daniel Apon,et al. Status report on the first round of the NIST post-quantum cryptography standardization process , 2019 .
[2] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2009, JACM.
[3] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.3 , 2018, RFC.
[4] Henri Gilbert,et al. Assessment of the Key-Reuse Resilience of NewHope , 2019, IACR Cryptol. ePrint Arch..
[5] Damien Stehlé,et al. CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM , 2017, 2018 IEEE European Symposium on Security and Privacy (EuroS&P).
[6] Jintai Ding,et al. A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem , 2012, IACR Cryptol. ePrint Arch..
[7] Chi Cheng,et al. A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope , 2019, IACR Cryptol. ePrint Arch..
[8] Serge Vaudenay,et al. Misuse Attacks on Post-quantum Cryptosystems , 2019, EUROCRYPT.
[9] Miklós Ajtai,et al. Generating Hard Instances of Lattice Problems , 1996, Electron. Colloquium Comput. Complex..
[10] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[11] Erdem Alkim,et al. Post-quantum Key Exchange - A New Hope , 2016, USENIX Security Symposium.
[12] Scott R. Fluhrer,et al. Cryptanalysis of ring-LWE based key exchange with key share reuse , 2016, IACR Cryptol. ePrint Arch..
[13] Jintai Ding,et al. Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage , 2018, IACR Cryptol. ePrint Arch..
[14] Laszlo Gyongyosi,et al. A Survey on quantum computing technology , 2019, Comput. Sci. Rev..
[15] Yunlei Zhao,et al. Cryptanalysis of RLWE-Based One-Pass Authenticated Key Exchange , 2017, PQCrypto.
[16] Damien Stehlé,et al. CRYSTALS-Kyber Algorithm Specifications And Supporting Documentation , 2017 .
[17] Chao Liu,et al. Key Reuse Attack on NewHope Key Exchange Protocol , 2018, ICISC.
[18] Martin R. Albrecht,et al. NewHope Algorithm Specifications and Supporting Documentation , 2017 .
[19] Jintai Ding,et al. Leakage of signal function with reused keys in RLWE key exchange , 2017, 2017 IEEE International Conference on Communications (ICC).