Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention in the research community, including several larger projects and a standardization effort from NIST. One of the most promising algorithms is the code-based scheme called QC-MDPC, which has excellent performance and a small public key size. In this work we present a very efficient key recovery attack on the QCMDPC scheme using the fact that decryption uses an iterative decoding step and this can fail with some small probability. We identify a dependence between the secret key and the failure in decoding. This can be used to build what we refer to as a distance spectrum for the secret key, which is the set of all distances between any two ones ...
International audienceWe analyze a new key recovery attack against the Quasi-Cyclic MDPC McEliece sc...
Well before large-scale quantum computers will be available, traditional cryptosystems must be trans...
Post-quantum cryptography aims at securing exchanges against an adversary with a quantum computer. O...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention ...
Code-based cryptography has received a lot of attention recently because it is considered secure und...
In 2013, Misoczki, Tillich, Sendrier and Barreto proposed a variant of the McEliece cryptosystem bas...
Cryptosystems based on Learning with Errors or related problems are central topics in recent cryptog...
Code-based cryptography is one of the main techniques enabling cryptographic primitives in a post-qu...
QcBits is a code-based public key algorithm based on a problem thought to be resistant to quantum co...
Guo et al. recently presented a reaction attack against the QC-MDPC McEliece cryptosystem. Their att...
Public-key cryptosystems built on quasi-cyclic (QC) low-density parity-check and moderate-density pa...
We study in this work a particular class of QC-MDPC codes for which the decoding failure rate is sig...
Post-quantum cryptography for resisting possible attacks from malicious quantum adversaries has beco...
In this paper, classical (iterative) decoding schemes for moderate-density parity-check (MDPC) codes...
Today, most public-key cryptosystems used to ensure the privacy and authenticity of communications r...
International audienceWe analyze a new key recovery attack against the Quasi-Cyclic MDPC McEliece sc...
Well before large-scale quantum computers will be available, traditional cryptosystems must be trans...
Post-quantum cryptography aims at securing exchanges against an adversary with a quantum computer. O...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention ...
Code-based cryptography has received a lot of attention recently because it is considered secure und...
In 2013, Misoczki, Tillich, Sendrier and Barreto proposed a variant of the McEliece cryptosystem bas...
Cryptosystems based on Learning with Errors or related problems are central topics in recent cryptog...
Code-based cryptography is one of the main techniques enabling cryptographic primitives in a post-qu...
QcBits is a code-based public key algorithm based on a problem thought to be resistant to quantum co...
Guo et al. recently presented a reaction attack against the QC-MDPC McEliece cryptosystem. Their att...
Public-key cryptosystems built on quasi-cyclic (QC) low-density parity-check and moderate-density pa...
We study in this work a particular class of QC-MDPC codes for which the decoding failure rate is sig...
Post-quantum cryptography for resisting possible attacks from malicious quantum adversaries has beco...
In this paper, classical (iterative) decoding schemes for moderate-density parity-check (MDPC) codes...
Today, most public-key cryptosystems used to ensure the privacy and authenticity of communications r...
International audienceWe analyze a new key recovery attack against the Quasi-Cyclic MDPC McEliece sc...
Well before large-scale quantum computers will be available, traditional cryptosystems must be trans...
Post-quantum cryptography aims at securing exchanges against an adversary with a quantum computer. O...