{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T04:54:43Z","timestamp":1769921683363,"version":"3.49.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031627422","type":"print"},{"value":"9783031627439","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-62743-9_11","type":"book-chapter","created":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T23:02:58Z","timestamp":1718060578000},"page":"322-342","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Improved Practical Key Mismatch Attack Against NTRU"],"prefix":"10.1007","author":[{"given":"Zhen","family":"Liu","sequence":"first","affiliation":[]},{"family":"Vishakha","sequence":"additional","affiliation":[]},{"given":"Jintai","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Chi","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Yanbin","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,11]]},"reference":[{"key":"11_CR1","unstructured":"NIST post-quantum cryptography project. https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography\/Round-3-Submissions"},{"key":"11_CR2","unstructured":"Alkim, E., et al.: NewHope (2017). NewHope_2017_12_21. pdf"},{"key":"11_CR3","unstructured":"ANSI, X.: 98: Lattice-based polynomial public key establishment algorithm for the financial services industry. Tech. rep., Technical report, ANSI (2010)"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-030-12612-4_14","volume-title":"Topics in Cryptology \u2013 CT-RSA 2019","author":"A Bauer","year":"2019","unstructured":"Bauer, A., Gilbert, H., Renault, G., Rossi, M.: Assessment of the key-reuse resilience of NewHope. In: Matsui, M. (ed.) CT-RSA 2019. LNCS, vol. 11405, pp. 272\u2013292. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-12612-4_14"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-319-72565-9_12","volume-title":"Selected Areas in Cryptography \u2013 SAC 2017","author":"DJ Bernstein","year":"2018","unstructured":"Bernstein, D.J., Chuengsatiansup, C., Lange, T., van Vredendaal, C.: NTRU prime: reducing attack surface at low cost. In: Adams, C., Camenisch, J. (eds.) SAC 2017. LNCS, vol. 10719, pp. 235\u2013260. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-72565-9_12"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Bos, J., et al.: Crystals-kyber: a CCA-secure module-lattice-based KEM. In: 2018 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 353\u2013367. IEEE (2018)","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"11_CR7","unstructured":"Chen, C., Hoffstein, J., Whyte, W., Zhang, Z.: NTRUEncrypt. Tech. rep. (2019). https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-1-submissions"},{"key":"11_CR8","unstructured":"Ding, J., Deaton, J., Schmidt, K., Zhang, Z., et\u00a0al.: A simple and efficient key reuse attack on NTRU cryptosystem. Cryptology ePrint Archive (2019)"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/978-3-319-93638-3_27","volume-title":"Information Security and Privacy","author":"J Ding","year":"2018","unstructured":"Ding, J., Fluhrer, S., Rv, S.: Complete attack on RLWE key exchange with reused keys, without signal leakage. In: Susilo, W., Yang, G. (eds.) ACISP 2018. LNCS, vol. 10946, pp. 467\u2013486. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93638-3_27"},{"key":"11_CR10","unstructured":"Ding, J., Xie, X., Lin, X.: A simple provably secure key exchange scheme based on the learning with errors problem. Cryptology ePrint Archive (2012)"},{"key":"11_CR11","unstructured":"D\u2019Anvers, J., Karmakar, A., Roy, S., Vercauteren, F.: Saber: Mod-LWR based KEM algorithm specification and supporting documentation. Tech. rep. (2019). https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-1-submissions"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/978-3-030-65411-5_27","volume-title":"Cryptology and Network Security","author":"A Greuet","year":"2020","unstructured":"Greuet, A., Montoya, S., Renault, G.: Attack on LAC key exchange in misuse situation. In: Krenn, S., Shulman, H., Vaudenay, S. (eds.) CANS 2020. LNCS, vol. 12579, pp. 549\u2013569. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-65411-5_27"},{"key":"11_CR13","doi-asserted-by":"publisher","unstructured":"Guo, Q., M\u00e5rtensson, E.: Do not bound to a single position: near-optimal multi-positional mismatch attacks against kyber and saber. In: Johansson, T., Smith-Tone, D. (eds.) Post-Quantum Cryptography. PQCrypto 2023. LNCS, vol. 14154. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-40003-2_11","DOI":"10.1007\/978-3-031-40003-2_11"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/978-3-642-01957-9_27","volume-title":"Applied Cryptography and Network Security","author":"PS Hirschhorn","year":"2009","unstructured":"Hirschhorn, P.S., Hoffstein, J., Howgrave-Graham, N., Whyte, W.: Choosing NTRUEncrypt parameters in light of combined lattice reduction and MITM approaches. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 437\u2013455. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01957-9_27"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-52153-4_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2017","author":"J Hoffstein","year":"2017","unstructured":"Hoffstein, J., Pipher, J., Schanck, J.M., Silverman, J.H., Whyte, W., Zhang, Z.: Choosing parameters for NTRUEncrypt. In: Handschuh, H. (ed.) CT-RSA 2017. LNCS, vol. 10159, pp. 3\u201318. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-52153-4_1"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/BFb0054868","volume-title":"Algorithmic Number Theory","author":"J Hoffstein","year":"1998","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a ring-based public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267\u2013288. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0054868"},{"key":"11_CR17","unstructured":"Hoffstein, J., Silverman, J.H.: Reaction attacks against the NTRU public key cryptosystem (2000). https:\/\/ntru.org\/resources.shtml"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-540-45146-4_14","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"N Howgrave-Graham","year":"2003","unstructured":"Howgrave-Graham, N., et al.: The impact of decryption failures on the security of NTRU encryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 226\u2013246. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_14"},{"key":"11_CR19","first-page":"172","volume":"2003","author":"N Howgrave-Graham","year":"2003","unstructured":"Howgrave-Graham, N., Silverman, J.H., Singer, A., Whyte, W., Cryptosystems, N.: NAEP: provable security in the presence of decryption failures. IACR Cryptology ePrint Archive 2003, 172 (2003)","journal-title":"IACR Cryptology ePrint Archive"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/978-3-319-66787-4_12","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"A H\u00fclsing","year":"2017","unstructured":"H\u00fclsing, A., Rijneveld, J., Schanck, J., Schwabe, P.: High-speed key encapsulation from NTRU. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 232\u2013252. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_12"},{"key":"11_CR21","unstructured":"Lu, X., et al.: Lac: Practical ring-LWE based public-key encryption with byte-level modulus. Cryptology ePrint Archive (2018)"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Mol, P., Yung, M.: Recovering NTRU secret key from inversion oracles, pp. 18\u201336 (2008)","DOI":"10.1007\/978-3-540-78440-1_2"},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/3-540-45708-9_14","volume-title":"Advances in Cryptology \u2014 CRYPTO 2002","author":"PQ Nguyen","year":"2002","unstructured":"Nguyen, P.Q., Pointcheval, D.: Analysis and improvements of NTRU encryption paddings. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 210\u2013225. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45708-9_14"},{"key":"11_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-3-030-55304-3_26","volume-title":"Information Security and Privacy","author":"S Okada","year":"2020","unstructured":"Okada, S., Wang, Y., Takagi, T.: Improving key mismatch attack on NewHope with fewer queries. In: Liu, J.K., Cui, H. (eds.) ACISP 2020. LNCS, vol. 12248, pp. 505\u2013524. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-55304-3_26"},{"key":"11_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1007\/978-3-030-29962-0_24","volume-title":"Computer Security \u2013 ESORICS 2019","author":"Y Qin","year":"2019","unstructured":"Qin, Y., Cheng, C., Ding, J.: A complete and optimized key mismatch attack on NIST candidate NewHope. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019. LNCS, vol. 11736, pp. 504\u2013520. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29962-0_24"},{"key":"11_CR26","unstructured":"Qin, Y., Cheng, C., Ding, J.: An efficient key mismatch attack on the NIST second round candidate kyber. Cryptology ePrint Archive (2019)"},{"key":"11_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-030-92068-5_4","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2021","author":"Y Qin","year":"2021","unstructured":"Qin, Y., Cheng, C., Zhang, X., Pan, Y., Hu, L., Ding, J.: A systematic approach and\u00a0analysis of\u00a0key mismatch attacks on\u00a0lattice-based NIST candidate KEMs. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT 2021. LNCS, vol. 13093, pp. 92\u2013121. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92068-5_4"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Ravi, P., Roy, S.S., Chattopadhyay, A., Bhasin, S.: Generic side-channel attacks on CCA-secure lattice-based PKE and KEMS. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 307\u2013335 (2020)","DOI":"10.46586\/tches.v2020.i3.307-335"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Shao, M., Liu, Y., Zhou, Y.: Pairwise and parallel: enhancing the key mismatch attacks on kyber and beyond. Cryptology ePrint Archive (2023)","DOI":"10.1145\/3634737.3637661"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Foundations of Computer Science, 1994 Proceedings of the 35th Annual Symposium on, pp. 124\u2013134. IEEE (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"issue":"2","key":"11_CR31","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"key":"11_CR32","unstructured":"Whyte, W., Howgrave-Graham, N., Hoffstein, J., Pipher, J., Silverman, J., Hirschhorn, P.: Ieee p1363. 1: Draft standard for public-key cryptographic techniques based on hard problems over lattices. Tech. rep., Technical report, IEEE (2008)"},{"key":"11_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-030-92075-3_2","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2021","author":"K Xagawa","year":"2021","unstructured":"Xagawa, K., Ito, A., Ueno, R., Takahashi, J., Homma, N.: Fault-injection attacks against NIST\u2019s post-quantum cryptography round 3 KEM candidates. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT 2021. LNCS, vol. 13091, pp. 33\u201361. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92075-3_2"},{"key":"11_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-030-88052-1_17","volume-title":"Information and Communications Security","author":"X Zhang","year":"2021","unstructured":"Zhang, X., Cheng, C., Ding, R.: Small leaks sink a great ship: an\u00a0evaluation of key reuse resilience of\u00a0PQC third round finalist NTRU-HRSS. In: Gao, D., Li, Q., Guan, X., Liao, X. (eds.) ICICS 2021. LNCS, vol. 12919, pp. 283\u2013300. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88052-1_17"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-62743-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T14:54:25Z","timestamp":1732200865000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-62743-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031627422","9783031627439"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-62743-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"11 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PQCrypto","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Post-Quantum Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oxford","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pqcrypto2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.maths.ox.ac.uk\/events\/conferences\/pqcrypto-2024","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}