Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs.
Prasanna RaviShivam BhasinAnupam Chattopadhyay AikataSujoy Sinha RoyPublished in: ACM Great Lakes Symposium on VLSI (2024)
Keyphrases
- cryptographic algorithms
- countermeasures
- information security
- cellular automata
- security protocols
- quantum mechanics
- computer security
- quantum computing
- cryptographic protocols
- security mechanisms
- quantum inspired
- attack detection
- concept lattice
- quantum computation
- genetic algorithm
- traffic analysis
- watermarking scheme
- chosen plaintext
- malicious users
- probability ranking principle
- security threats
- terrorist attacks
- malicious attacks
- security issues
- network security
- access control