首页 > 最新文献

Post-Quantum Cryptography最新文献

英文 中文
Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation 基于请求分片的DNSSEC后量子签名
Pub Date : 2022-11-25 DOI: 10.48550/arXiv.2211.14196
Jason R. Goertzen, D. Stebila
The Domain Name System Security Extensions (DNSSEC) provide authentication of DNS responses using digital signatures. DNS operates primarily over UDP, which leads to several constraints: notably, packets should be at most 1232 bytes long to avoid problems during transmission. Larger DNS responses either need to be fragmented into several UDP responses or the request would need to be repeated over TCP, neither of which is sufficiently reliable in today's DNS ecosystem. While RSA or elliptic curve digital signatures are sufficiently small to avoid this problem, even for DNSSEC packets containing both a public key and a signature, this problem is unavoidable when considering the larger sizes of post-quantum schemes. We propose ARRF, a method of fragmenting DNS resource records at the application layer (rather than the transport layer) that is request-based, meaning the initial response contains a truncated fragment and then the requester sends follow-up requests for the remaining fragments. Using request-based fragmentation avoids problems identified for several previously proposed (and rejected) application-level DNS fragmentation techniques. We implement our approach and evaluate its performance in a simulated network when used for the three post-quantum digital signature schemes selected by NIST for standardization (Falcon, Dilithium, and SPHINCS+) at the 128-bit security level. Our experiments show that our request-based fragmentation approach provides substantially lower resolution times compared to standard DNS over UDP with TCP fallback, for all the tested post-quantum algorithms, and with less data transmitted in the case of both Falcon and Dilithium. Furthermore, our request-based fragmentation design can be implemented relatively easily: our implementation is in fact a small daemon that can sit in front of a DNS name server or resolver to fragment/reassemble transparently.
DNSSEC (Domain Name System Security Extensions)通过数字签名对DNS响应进行认证。DNS主要在UDP上运行,这导致了几个限制:值得注意的是,数据包最长应该是1232字节,以避免在传输过程中出现问题。较大的DNS响应要么需要分割成几个UDP响应,要么需要通过TCP重复请求,这两种方式在当今的DNS生态系统中都不够可靠。虽然RSA或椭圆曲线数字签名足够小,可以避免这个问题,即使对于同时包含公钥和签名的DNSSEC数据包,但在考虑更大的后量子方案时,这个问题是不可避免的。我们提出ARRF,这是一种基于请求的在应用层(而不是传输层)分割DNS资源记录的方法,这意味着初始响应包含截断的片段,然后请求者为剩余的片段发送后续请求。使用基于请求的分段可以避免先前提出的(和拒绝的)应用程序级DNS分段技术所存在的问题。我们实现了我们的方法,并在模拟网络中评估了它在128位安全级别上用于NIST选择的三种后量子数字签名方案(Falcon、Dilithium和SPHINCS+)的性能。我们的实验表明,对于所有测试的后量子算法,我们基于请求的碎片化方法提供的解析时间大大低于基于TCP回降的UDP标准DNS,并且在Falcon和Dilithium的情况下传输的数据更少。此外,我们基于请求的碎片化设计可以相对容易地实现:我们的实现实际上是一个小的守护进程,它可以位于DNS名称服务器或解析器前面,透明地进行碎片化/重新组装。
{"title":"Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation","authors":"Jason R. Goertzen, D. Stebila","doi":"10.48550/arXiv.2211.14196","DOIUrl":"https://doi.org/10.48550/arXiv.2211.14196","url":null,"abstract":"The Domain Name System Security Extensions (DNSSEC) provide authentication of DNS responses using digital signatures. DNS operates primarily over UDP, which leads to several constraints: notably, packets should be at most 1232 bytes long to avoid problems during transmission. Larger DNS responses either need to be fragmented into several UDP responses or the request would need to be repeated over TCP, neither of which is sufficiently reliable in today's DNS ecosystem. While RSA or elliptic curve digital signatures are sufficiently small to avoid this problem, even for DNSSEC packets containing both a public key and a signature, this problem is unavoidable when considering the larger sizes of post-quantum schemes. We propose ARRF, a method of fragmenting DNS resource records at the application layer (rather than the transport layer) that is request-based, meaning the initial response contains a truncated fragment and then the requester sends follow-up requests for the remaining fragments. Using request-based fragmentation avoids problems identified for several previously proposed (and rejected) application-level DNS fragmentation techniques. We implement our approach and evaluate its performance in a simulated network when used for the three post-quantum digital signature schemes selected by NIST for standardization (Falcon, Dilithium, and SPHINCS+) at the 128-bit security level. Our experiments show that our request-based fragmentation approach provides substantially lower resolution times compared to standard DNS over UDP with TCP fallback, for all the tested post-quantum algorithms, and with less data transmitted in the case of both Falcon and Dilithium. Furthermore, our request-based fragmentation design can be implemented relatively easily: our implementation is in fact a small daemon that can sit in front of a DNS name server or resolver to fragment/reassemble transparently.","PeriodicalId":228749,"journal":{"name":"Post-Quantum Cryptography","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124817749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improvement of algebraic attacks for solving superdetermined MinRank instances 求解超确定MinRank实例的代数攻击改进
Pub Date : 2022-08-02 DOI: 10.48550/arXiv.2208.01442
M. Bardet, Manon Bertin
The MinRank (MR) problem is a computational problem that arises in many cryptographic applications. In Verbel et al. [24], the authors introduced a new way to solve superdetermined instances of the MinRank problem, starting from the bilinear Kipnis-Shamir (KS) modeling. They use linear algebra on specific Macaulay matrices, considering only multiples of the initial equations by one block of variables, the so called “kernel” variables. Later, Bardet et al. [7] introduced a new Support Minors modeling (SM), that consider the Plücker coordinates associated to the kernel variables, i.e. the maximal minors of the Kernel matrix in the KS modeling. In this paper, we give a complete algebraic explanation of the link between the (KS) and (SM) modelings (for any instance). We then show that superdetermined MinRank instances can be seen as easy instances of the SM modeling. In particular, we show that performing computation at the smallest possible degree (the “first degree fall”) and the smallest possible number of variables is not always the best strategy. We give complexity estimates of the attack for generic random instances. We apply those results to the DAGS cryptosystem, that was submitted to the first round of the NIST standardization process. We show that the algebraic attack from Barelli and Couvreur [8], improved in Bardet et al. [5], is a particular superdetermined MinRank instance. Here, the instances are not generic, but we show that it is possible to analyse the particular instances from DAGS and provide a way to select the optimal parameters (number of shortened positions) to solve a particular instance.
MinRank (MR)问题是许多密码学应用中出现的一个计算问题。在Verbel et al. b[24]中,作者从双线性Kipnis-Shamir (KS)建模开始,引入了一种新的方法来解决MinRank问题的超确定实例。他们在特定的麦考利矩阵上使用线性代数,只考虑初始方程与一组变量的倍数,即所谓的“核”变量。后来,Bardet等人引入了一种新的Support minor modeling (SM),该模型考虑了与内核变量相关的pl cker坐标,即KS建模中内核矩阵的最大minor。在本文中,我们给出了一个完整的代数解释(KS)和(SM)模型之间的联系(对于任何实例)。然后,我们展示了超确定的MinRank实例可以看作是SM建模的简单实例。特别是,我们表明,在尽可能小的程度(“第一次下降”)和尽可能小的变量数量上执行计算并不总是最好的策略。我们给出了针对一般随机实例的攻击复杂度估计。我们将这些结果应用于提交给NIST标准化过程第一轮的DAGS密码系统。我们证明了Bardet et al.[5]改进的Barelli和Couvreur[8]的代数攻击是一个特殊的超确定MinRank实例。在这里,实例不是通用的,但是我们表明有可能分析来自DAGS的特定实例,并提供一种选择最佳参数(缩短位置的数量)来解决特定实例的方法。
{"title":"Improvement of algebraic attacks for solving superdetermined MinRank instances","authors":"M. Bardet, Manon Bertin","doi":"10.48550/arXiv.2208.01442","DOIUrl":"https://doi.org/10.48550/arXiv.2208.01442","url":null,"abstract":"The MinRank (MR) problem is a computational problem that arises in many cryptographic applications. In Verbel et al. [24], the authors introduced a new way to solve superdetermined instances of the MinRank problem, starting from the bilinear Kipnis-Shamir (KS) modeling. They use linear algebra on specific Macaulay matrices, considering only multiples of the initial equations by one block of variables, the so called “kernel” variables. Later, Bardet et al. [7] introduced a new Support Minors modeling (SM), that consider the Plücker coordinates associated to the kernel variables, i.e. the maximal minors of the Kernel matrix in the KS modeling. In this paper, we give a complete algebraic explanation of the link between the (KS) and (SM) modelings (for any instance). We then show that superdetermined MinRank instances can be seen as easy instances of the SM modeling. In particular, we show that performing computation at the smallest possible degree (the “first degree fall”) and the smallest possible number of variables is not always the best strategy. We give complexity estimates of the attack for generic random instances. We apply those results to the DAGS cryptosystem, that was submitted to the first round of the NIST standardization process. We show that the algebraic attack from Barelli and Couvreur [8], improved in Bardet et al. [5], is a particular superdetermined MinRank instance. Here, the instances are not generic, but we show that it is possible to analyse the particular instances from DAGS and provide a way to select the optimal parameters (number of shortened positions) to solve a particular instance.","PeriodicalId":228749,"journal":{"name":"Post-Quantum Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131189188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Time and Query Complexity Tradeoffs for the Dihedral Coset Problem 二面体协集问题的时间和查询复杂度权衡
Pub Date : 2022-06-29 DOI: 10.1007/978-3-031-40003-2_19
Maxime Remaud, A. Schrottenloher, J. Tillich
{"title":"Time and Query Complexity Tradeoffs for the Dihedral Coset Problem","authors":"Maxime Remaud, A. Schrottenloher, J. Tillich","doi":"10.1007/978-3-031-40003-2_19","DOIUrl":"https://doi.org/10.1007/978-3-031-40003-2_19","url":null,"abstract":"","PeriodicalId":228749,"journal":{"name":"Post-Quantum Cryptography","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129780839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LRPC codes with multiple syndromes: near ideal-size KEMs without ideals 具有多综合征的LRPC代码:接近理想大小的没有理想的kem
Pub Date : 2022-06-23 DOI: 10.48550/arXiv.2206.11961
C. A. Melchor, Nicolas Aragon, Victor Dyseryn, P. Gaborit, Gilles Z'emor
We introduce a new rank-based key encapsulation mechanism (KEM) with public key and ciphertext sizes around 3.5 Kbytes each, for 128 bits of security, without using ideal structures. Such structures allow to compress objects, but give reductions to specific problems whose security is potentially weaker than for unstructured problems. To the best of our knowledge, our scheme improves in size all the existing unstructured post-quantum lattice or code-based algorithms such as FrodoKEM or Classic McEliece. Our technique, whose efficiency relies on properties of rank metric, is to build upon existing Low Rank Parity Check (LRPC) code-based KEMs and to send multiple syndromes in one ciphertext, allowing to reduce the parameters and still obtain an acceptable decoding failure rate. Our system relies on the hardness of the Rank Support Learning problem, a well-known variant of the Rank Syndrome Decoding problem. The gain on parameters is enough to significantly close the gap between ideal and non-ideal constructions. It enables to choose an error weight close to the rank Gilbert-Varshamov bound, which is a relatively harder zone for algebraic attacks. We also give a version of our KEM that keeps an ideal structure and permits to roughly divide the bandwidth by two compared to previous versions of LRPC KEMs submitted to the NIST with a Decoding Failure Rate (DFR) of $2^{-128}$.
我们引入了一种新的基于等级的密钥封装机制(KEM),公钥和密文大小各为3.5 kb,安全性为128位,而不使用理想的结构。这种结构允许压缩对象,但对某些问题进行了简化,这些问题的安全性可能比非结构化问题弱。据我们所知,我们的方案在大小上改进了所有现有的非结构化后量子点阵或基于代码的算法,如FrodoKEM或Classic McEliece。我们的技术,其效率依赖于秩度量的属性,是建立在现有的基于低秩奇偶校验(LRPC)码的kem基础上,并在一个密文中发送多个综合征,允许减少参数并仍然获得可接受的解码失败率。我们的系统依赖于秩支持学习问题的硬度,这是一个众所周知的秩综合征解码问题的变体。参数的增益足以显著缩小理想和非理想结构之间的差距。它可以选择一个接近秩Gilbert-Varshamov界的错误权值,这是代数攻击相对较难的区域。我们还给出了我们的KEM的一个版本,它保持了理想的结构,并且与提交给NIST的先前版本的LRPC KEM相比,它允许将带宽大致除以2,解码失败率(DFR)为$2^{-128}$。
{"title":"LRPC codes with multiple syndromes: near ideal-size KEMs without ideals","authors":"C. A. Melchor, Nicolas Aragon, Victor Dyseryn, P. Gaborit, Gilles Z'emor","doi":"10.48550/arXiv.2206.11961","DOIUrl":"https://doi.org/10.48550/arXiv.2206.11961","url":null,"abstract":"We introduce a new rank-based key encapsulation mechanism (KEM) with public key and ciphertext sizes around 3.5 Kbytes each, for 128 bits of security, without using ideal structures. Such structures allow to compress objects, but give reductions to specific problems whose security is potentially weaker than for unstructured problems. To the best of our knowledge, our scheme improves in size all the existing unstructured post-quantum lattice or code-based algorithms such as FrodoKEM or Classic McEliece. Our technique, whose efficiency relies on properties of rank metric, is to build upon existing Low Rank Parity Check (LRPC) code-based KEMs and to send multiple syndromes in one ciphertext, allowing to reduce the parameters and still obtain an acceptable decoding failure rate. Our system relies on the hardness of the Rank Support Learning problem, a well-known variant of the Rank Syndrome Decoding problem. The gain on parameters is enough to significantly close the gap between ideal and non-ideal constructions. It enables to choose an error weight close to the rank Gilbert-Varshamov bound, which is a relatively harder zone for algebraic attacks. We also give a version of our KEM that keeps an ideal structure and permits to roughly divide the bandwidth by two compared to previous versions of LRPC KEMs submitted to the NIST with a Decoding Failure Rate (DFR) of $2^{-128}$.","PeriodicalId":228749,"journal":{"name":"Post-Quantum Cryptography","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115710327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Interleaved Prange: A New Generic Decoder for Interleaved Codes 交错区间:一种新的交错码通用解码器
Pub Date : 2022-05-27 DOI: 10.48550/arXiv.2205.14068
Anmoal Porwal, Lukas Holzbaur, Hedongliang Liu, Julian Renner, A. Wachter-Zeh, Violetta Weger
Due to the recent challenges in post-quantum cryptography, several new approaches for code-based cryptography have been proposed. For example, a variant of the McEliece cryptosystem based on interleaved codes was proposed. In order to deem such new settings secure, we first need to understand and analyze the complexity of the underlying problem, in this case the problem of decoding a random interleaved code. A simple approach to decode such codes, would be to randomly choose a vector in the row span of the received matrix and run a classical information set decoding algorithm on this erroneous codeword. In this paper, we propose a new generic decoder for interleaved codes, which is an adaption of the classical idea of information set decoding by Prange and perfectly fits the interleaved setting. We then analyze the cost of the new algorithm and a comparison to the simple approach described above shows the superiority of Interleaved Prange.
由于后量子密码学最近面临的挑战,人们提出了几种新的基于代码的密码学方法。例如,提出了一种基于交错码的McEliece密码系统的变体。为了确保这种新设置的安全性,我们首先需要了解和分析潜在问题的复杂性,在这种情况下,解码随机交错码的问题。解码这种码的一种简单方法是,在接收矩阵的行跨度中随机选择一个向量,并对该错误码字运行经典信息集解码算法。本文提出了一种新的通用的交错码解码器,该解码器采用了经典的普朗格信息集译码思想,能够很好地适应交错码的设置。然后,我们分析了新算法的成本,并与上面描述的简单方法进行了比较,表明了交错区间的优越性。
{"title":"Interleaved Prange: A New Generic Decoder for Interleaved Codes","authors":"Anmoal Porwal, Lukas Holzbaur, Hedongliang Liu, Julian Renner, A. Wachter-Zeh, Violetta Weger","doi":"10.48550/arXiv.2205.14068","DOIUrl":"https://doi.org/10.48550/arXiv.2205.14068","url":null,"abstract":"Due to the recent challenges in post-quantum cryptography, several new approaches for code-based cryptography have been proposed. For example, a variant of the McEliece cryptosystem based on interleaved codes was proposed. In order to deem such new settings secure, we first need to understand and analyze the complexity of the underlying problem, in this case the problem of decoding a random interleaved code. A simple approach to decode such codes, would be to randomly choose a vector in the row span of the received matrix and run a classical information set decoding algorithm on this erroneous codeword. In this paper, we propose a new generic decoder for interleaved codes, which is an adaption of the classical idea of information set decoding by Prange and perfectly fits the interleaved setting. We then analyze the cost of the new algorithm and a comparison to the simple approach described above shows the superiority of Interleaved Prange.","PeriodicalId":228749,"journal":{"name":"Post-Quantum Cryptography","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134061858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Generating Cryptographically-Strong Random Lattice Bases and Recognizing Rotations of $mathbb {Z}^n$ 生成密码强随机格基和识别$mathbb {Z}^n$的旋转
Pub Date : 2021-02-12 DOI: 10.1007/978-3-030-81293-5_17
Tamar Lichter Blanks, S. Miller
{"title":"Generating Cryptographically-Strong Random Lattice Bases and Recognizing Rotations of $mathbb {Z}^n$","authors":"Tamar Lichter Blanks, S. Miller","doi":"10.1007/978-3-030-81293-5_17","DOIUrl":"https://doi.org/10.1007/978-3-030-81293-5_17","url":null,"abstract":"","PeriodicalId":228749,"journal":{"name":"Post-Quantum Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123088778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Rank Attack Against Extension Field Cancellation 对扩展域取消的秩攻击
Pub Date : 2020-04-15 DOI: 10.1007/978-3-030-44223-1_21
Daniel Smith-Tone, Javier A. Verbel
{"title":"A Rank Attack Against Extension Field Cancellation","authors":"Daniel Smith-Tone, Javier A. Verbel","doi":"10.1007/978-3-030-44223-1_21","DOIUrl":"https://doi.org/10.1007/978-3-030-44223-1_21","url":null,"abstract":"","PeriodicalId":228749,"journal":{"name":"Post-Quantum Cryptography","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126716781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Generalization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key Encryption 二秘多项式同构的推广及其在公钥加密中的应用
Pub Date : 2020-04-15 DOI: 10.1007/978-3-030-44223-1_19
Bagus Santoso
{"title":"Generalization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key Encryption","authors":"Bagus Santoso","doi":"10.1007/978-3-030-44223-1_19","DOIUrl":"https://doi.org/10.1007/978-3-030-44223-1_19","url":null,"abstract":"","PeriodicalId":228749,"journal":{"name":"Post-Quantum Cryptography","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121341249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Compact Privacy Protocols from Post-quantum and Timed Classical Assumptions 基于后量子和时间经典假设的紧凑隐私协议
Pub Date : 2020-04-15 DOI: 10.1007/978-3-030-44223-1_13
Jonathan Bootle, Anja Lehmann, Vadim Lyubashevsky, Gregor Seiler
{"title":"Compact Privacy Protocols from Post-quantum and Timed Classical Assumptions","authors":"Jonathan Bootle, Anja Lehmann, Vadim Lyubashevsky, Gregor Seiler","doi":"10.1007/978-3-030-44223-1_13","DOIUrl":"https://doi.org/10.1007/978-3-030-44223-1_13","url":null,"abstract":"","PeriodicalId":228749,"journal":{"name":"Post-Quantum Cryptography","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121610691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability 基于可分性的3型广义Feistel网络的量子区分符
Pub Date : 2020-04-15 DOI: 10.1007/978-3-030-44223-1_25
S. Hodžić, L. Knudsen, Andreas B. Kidmose
{"title":"On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability","authors":"S. Hodžić, L. Knudsen, Andreas B. Kidmose","doi":"10.1007/978-3-030-44223-1_25","DOIUrl":"https://doi.org/10.1007/978-3-030-44223-1_25","url":null,"abstract":"","PeriodicalId":228749,"journal":{"name":"Post-Quantum Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126142465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
Post-Quantum Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1