2020
DOI: 10.1007/978-3-030-65411-5_27
|View full text |Cite
|
Sign up to set email alerts
|

Attack on LAC Key Exchange in Misuse Situation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…69 schemes were passed into Round 1, 26 were able to get into Round 2 and currently there are seven finalists and eight alternate candidates in Round 3 expected to be completed by the end on 2021. Similar schemes were merged together and some were attacked by the cryptographic community and were taken out of the competition [4], [5], [6], [7], [8], [9], [10], [11], [12]. There are five categories based on the underlying hard problems: lattice-based, code-based, hash-based, isogeny-based and multivariate schemes.…”
Section: Introductionmentioning
confidence: 99%
“…69 schemes were passed into Round 1, 26 were able to get into Round 2 and currently there are seven finalists and eight alternate candidates in Round 3 expected to be completed by the end on 2021. Similar schemes were merged together and some were attacked by the cryptographic community and were taken out of the competition [4], [5], [6], [7], [8], [9], [10], [11], [12]. There are five categories based on the underlying hard problems: lattice-based, code-based, hash-based, isogeny-based and multivariate schemes.…”
Section: Introductionmentioning
confidence: 99%