On the independence heuristic in the dual attack
Post-quantum cryptography deals with the development and analysis of cryptographic schemes that are assumed to be secure even against attackers with access to a powerful quantum computer. Along the main candidates for quantum-safe solutions are cryptographic schemes, whose security is based on class...
Saved in:
| Main Authors: | Bashiri Kaveh, Wiemers Andreas |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
De Gruyter
2025-07-01
|
| Series: | Journal of Mathematical Cryptology |
| Subjects: | |
| Online Access: | https://doi.org/10.1515/jmc-2024-0028 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Modern techniques in somewhat homomorphic encryption
by: Giulietti Massimo, et al.
Published: (2025-04-01) -
A small serving of mash: (Quantum) algorithms for SPDH-Sign with small parameters
by: Mendelsohn Andrew, et al.
Published: (2025-03-01) -
Improved Quantum Linear Attacks and Application to CAST
by: Kaveh Bashiri, et al.
Published: (2025-06-01) -
Revocable policy-based chameleon hash using lattices
by: Klamti Jean Belo, et al.
Published: (2024-11-01) -
Integral attack on MIBS block cipher
by: Zhi-shu PAN, et al.
Published: (2014-07-01)