Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs.
Prasanna RaviShivam BhasinAnupam Chattopadhyay AikataSujoy Sinha RoyPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- cryptographic algorithms
- cellular automata
- traffic analysis
- countermeasures
- cryptographic protocols
- malicious users
- attack detection
- information security
- watermarking scheme
- quantum computation
- computer security
- security protocols
- java card
- watermarking algorithm
- security risks
- logic circuits
- malicious attacks
- dos attacks
- data mining
- smart card
- anomaly detection