A practical key recovery attack on basic TCHo

M Herrmann, G Leander - International Workshop on Public Key …, 2009 - Springer
… In this paper we show, that TCHo cannot be used without this construction. We present a
chosen ciphertext attack on basic TCHo that recovers the secret key after approximately d3/2 …

TCHo: A Code-Based Cryptosystem

A Duc, S Vaudenay - Advances in Network Analysis and its Applications, 2012 - Springer
… mount a key recovery chosen ciphertext attack, which seemingly proves that the key recovery
… 7.2 we describe our notation and give basic definitions used throughout the paper. In Sect. …

When stream cipher analysis meets public-key cryptography

M Finiasz, S Vaudenay - International Workshop on Selected Areas in …, 2006 - Springer
… Inspired by fast correlation attacks on stream ciphers, we … We believe TCHo could also
fit on a passive RFID tag. … The main idea is to isolate one linear feedback shift-registers (LFSR) …

Improved algorithms for finding low-weight polynomial multiples in and some cryptographic applications

C Löndahl, T Johansson - Designs, codes and cryptography, 2014 - Springer
… show a key-recovery attack against … main result in this paper, we consider the problem of
finding a polynomial multiple of weight 4, which is a very relevant problem in correlation attacks

An approach for stream ciphers design based on joint computing over random and secret data

MJ Mihaljević, H Imai - Computing, 2009 - Springer
… The trapdoor cipher TCHo has been proposed in [1] where the additive noise has been …
are basic approaches for cryptanalysis of any stream cipher: (i) the generic key recovery attacks

[BOOK][B] Public Key Cryptography-PKC 2009: 12th International Conference on Practice and Theory in Public Key Cryptography Irvine, CA, USA, March 18-20, 2009 …

S Jarecki, G Tsudik - 2009 - books.google.com
It has been a real pleasure to have taken part in organizing the 12th International Conference
on Practice and Theory in Public Key Cryptography (PKC 2009). PKC 2009 was held …

[PDF][PDF] On Certain Approaches for Analysis and Design of Cryptographic Techniques for Symmetric Encryption and Key Management

MJ Mihaljevic - SELECTED TOPICS ON IMAGE PROCESSING AND …, 2012 - elibrary.math.rs
… The main goal of this section is to discuss the algorithm … The trapdoor cipher TCHo has
been proposed in [66] where the … :(i) the generic key recovery attacks based on different search …

Bringing Theory Closer to Practice in Post-quantum and Leakage-resilient Cryptography

AR Duc - 2015 - infoscience.epfl.ch
… evaluation framework [SMY09] for side-channel key recovery attacks introduced by Standaert
et al. In particular, we re-state the main proof of Chapter 9 for the masking countermeasure …

Secure application partitioning for intellectual property protection

CW O'Donnell - 2005 - dspace.mit.edu
Attacks, we can cover all possible security threats given the assumptions we have made in
on our model. Algorithm 1 gives basic pseudo-code describing how any Memoization Attack

Some notes on code-based cryptography

C Löndahl - 2015 - portal.research.lu.se
… Our results show that the new squaring attack allows for … of the instances used by the TCHo
cryptosystem. Secondly, we … This section introduces some basic concepts on probability …