搜索结果: 1-5 共查到“NewHope”相关记录5条 . 查询时间(0.036 秒)
A Complete and Efficient Key Mismatch Attack on NIST Candidate NewHope
key encapsulation mechanism NIST Candidate NewHope
2019/4/29
In CT-RSA 2019, Bauer et al. have analyzed the case when the public key is reused for the NewHope key encapsulation mechanism (KEM), a second-round candidate in the NIST Post-quantum Standard process....
Assessment of the Key-Reuse Resilience of NewHope
Post-quantum cryptography lattice based cryptography active attack
2019/1/26
NewHope is a suite of two efficient Ring-Learning-With-Error based key encapsulation mechanisms (KEMs) that has been proposed to the NIST call for proposals for post-quantum standardization. In this p...
Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE
NTT Preprocess-then-NTT Kyber
2018/11/5
The Number Theoretic Transform (NTT) provides efficient algorithm for multiplying large degree polynomials. It is commonly used in cryptographic schemes that are based on the hardness of the Ring Lear...
Breakdown Resilience of Key Exchange Protocols and the Cases of NewHope and TLS 1.3
key exchange hybrid key exchange
2018/1/2
Broken cryptographic algorithms and hardness assumptions are a constant threat to real-world protocols. Prominent examples are hash functions for which collisions become known, or number-theoretic ass...
In this paper we introduce NewHope-Simple, a variant of the NewHope Ring-LWE-based key exchange that is using a straight-forward transformation from Ring-LWE encryption to a passively secure KEM (or k...