2022
DOI: 10.1007/978-3-031-17140-6_33
|View full text |Cite
|
Sign up to set email alerts
|

Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 32 publications
0
0
0
Order By: Relevance
“…The reusable key feature can make the constructed protocols vulnerable to SLA ( Bindel, Stebila & Veitch, 2021 ). An SLA can occur with the reuse of the keys in protocols that use an additional information-based reconciliation mechanism since the shared key and additional information can leak information about the secret key ( Qin et al, 2022 ).…”
Section: Preliminariesmentioning
confidence: 99%
See 3 more Smart Citations
“…The reusable key feature can make the constructed protocols vulnerable to SLA ( Bindel, Stebila & Veitch, 2021 ). An SLA can occur with the reuse of the keys in protocols that use an additional information-based reconciliation mechanism since the shared key and additional information can leak information about the secret key ( Qin et al, 2022 ).…”
Section: Preliminariesmentioning
confidence: 99%
“… Note 1 Note that it was stated that if a BiGISIS problem-based key-sharing idea uses a reconciliation solution without sending additional information, SLA cannot be applicable to the constructed scheme. For detailed security proofs, we refer to Bindel, Stebila & Veitch (2021) , Qin et al (2022) .…”
Section: Security Analysismentioning
confidence: 99%
See 2 more Smart Citations