Results 231 to 240 of about 16,532 (241)
Some of the next articles are maybe not open access.
A New Decryption Failure Attack Against HQC
2020HQC is an IND-CCA2 KEM running for standardization in NIST’s post-quantum cryptography project and has advanced to the second round. It is a code-based scheme in the class of public key encryptions, with given sets of parameters spanning NIST security strength 1, 3 and 5, corresponding to 128, 192 and 256 bits of classic security.
Qian Guo, Thomas Johansson
openaire +1 more source
Decryption Failure Is More Likely After Success
2020The user of an imperfectly correct lattice-based public-key encryption scheme leaks information about their secret key with each decryption query that they answer—even if they answer all queries successfully. Through a refinement of the D’Anvers–Guo–Johansson–Nilsson–Vercauteren–Verbauwhede failure boosting attack, we show that an adversary can use ...
Nina Bindel, John M. Schanck
openaire +1 more source
The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures
2020Learning with Errors (LWE) and Ring-LWE (RLWE) problems allow the construction of efficient key exchange and public-key encryption schemes. However, while improving the security through the use of error distributions with large standard deviations, the decryption failure rate increases as well.
Georg Maringer +2 more
openaire +1 more source
International Petroleum Technology Conference, 2015
Abstract Multi Zone Single Trip Gravel Pack (MZ-STGP) system has been the solution for developing sand prone reservoirs in the Mahakam Delta, Indonesia. Despite providing cost effective solutions, few sand control failures has been recorded.
R. Wijaya +3 more
openaire +1 more source
Abstract Multi Zone Single Trip Gravel Pack (MZ-STGP) system has been the solution for developing sand prone reservoirs in the Mahakam Delta, Indonesia. Despite providing cost effective solutions, few sand control failures has been recorded.
R. Wijaya +3 more
openaire +1 more source
NTRU Binary Polynomials Parameters Selection for Reduction of Decryption Failure
2016This paper studies the NTRU public key cryptosystem to identify the most influential parameters for decryption failure confirming that decryption failure is key-dependent. The study uses binary polynomials and analyzes the correlation between the parameter sets recommended in the EESS 1v2 (2003) and Jeffrey Hoffstein et al. (2003).
Juliet N. Gaithuru +3 more
openaire +1 more source
Tight Analysis of Decryption Failure Probability of Kyber in Reality
2022Boyue Fang, Weize Wang, Yunlei Zhao
openaire +1 more source
Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber
2022Jan-Pieter D’Anvers, Senne Batsleer
openaire +1 more source
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks
2023Tianrui Wang, Anyu Wang, Xiaoyun Wang
openaire +1 more source
Provable Security Against Decryption Failure Attacks from LWE
Christian Majenz, Fabrizio Sisinniopenaire +1 more source

