Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems.
Terry Shue Chien LauChik How TanPublished in: Adv. Math. Commun. (2023)
Keyphrases
- secret key
- stream cipher
- chosen plaintext
- cryptographic protocols
- malicious code
- countermeasures
- ciphertext
- smart card
- block cipher
- java card
- source code
- static analysis
- complexity theoretic
- error detection
- special case
- worst case
- security analysis
- computational complexity
- pseudorandom
- elliptic curve
- public key
- encryption scheme
- security mechanisms
- key management
- authentication scheme
- approximation algorithms
- authentication protocol
- signature scheme
- watermarking scheme
- digital watermark
- np complete
- security protocols