Misuse Attacks on Post-quantum Cryptosystems.
Ciprian BaetuF. Betül DurakLoïs Huguenin-DumittanAbdullah TalayhanSerge VaudenayPublished in: EUROCRYPT (2) (2019)
Keyphrases
- countermeasures
- cryptographic protocols
- information security
- quantum computation
- quantum computing
- misuse detection
- information retrieval
- intrusion detection
- quantum inspired
- malicious attacks
- logic circuits
- elliptic curve
- traffic analysis
- quantum mechanics
- standard model
- security protocols
- secret key
- signature scheme
- security issues
- chosen plaintext