Public-key cryptosystems built on quasi-cyclic (QC) low-density parity-check and moderate-density parity-check codes are promising candidates for post-quantum cryptography, since they are characterised by compact keys and high algorithmic efficiency. The main issue with this kind of system is represented by the fact that, since the decoding procedure is probabilistic, it may leak information about the secret key. In this work, the authors study cryptanalysis procedures that aim at recovering the secret key by exploiting this fact. They identify the phenomenon that is at the basis of these procedures and show that the QC structure plays an important role in the success of these attacks. They use a graph analogy to study the complexity of th...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention ...
International audienceNowadays public-key cryptography is based on number theory problems, such as c...
Code-based cryptographic schemes are promising candidates for post-quantum cryptography since they a...
Public-key cryptosystems built on quasi-cyclic (QC) low-density parity-check and moderate-density pa...
In this paper we study reaction and timing attacks against cryptosystems based on sparse parity-chec...
Post-quantum cryptography for resisting possible attacks from malicious quantum adversaries has beco...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention ...
Guo et al. recently presented a reaction attack against the QC-MDPC McEliece cryptosystem. Their att...
Today, most public-key cryptosystems used to ensure the privacy and authenticity of communications r...
QcBits is a code-based public key algorithm based on a problem thought to be resistant to quantum co...
This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density p...
This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density p...
Post-quantum cryptography aims at securing exchanges against an adversary with a quantum computer. O...
One of the approaches to modify the McEliece cryptosystem to overcome its large key size is replacin...
Code-based cryptography has received a lot of attention recently because it is considered secure und...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention ...
International audienceNowadays public-key cryptography is based on number theory problems, such as c...
Code-based cryptographic schemes are promising candidates for post-quantum cryptography since they a...
Public-key cryptosystems built on quasi-cyclic (QC) low-density parity-check and moderate-density pa...
In this paper we study reaction and timing attacks against cryptosystems based on sparse parity-chec...
Post-quantum cryptography for resisting possible attacks from malicious quantum adversaries has beco...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention ...
Guo et al. recently presented a reaction attack against the QC-MDPC McEliece cryptosystem. Their att...
Today, most public-key cryptosystems used to ensure the privacy and authenticity of communications r...
QcBits is a code-based public key algorithm based on a problem thought to be resistant to quantum co...
This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density p...
This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density p...
Post-quantum cryptography aims at securing exchanges against an adversary with a quantum computer. O...
One of the approaches to modify the McEliece cryptosystem to overcome its large key size is replacin...
Code-based cryptography has received a lot of attention recently because it is considered secure und...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention ...
International audienceNowadays public-key cryptography is based on number theory problems, such as c...
Code-based cryptographic schemes are promising candidates for post-quantum cryptography since they a...