KpqC 1 라운드 TiGER KEM의 Meet-LWE 공격에 대한 안전성 분석
Vol. 33, No. 5, pp. 709-719,
10월.
2023
10.13089/JKIISC.2023.33.5.709,
Full Text:
Keywords: Post-Quantum Cryptography, KpqC Competition, Key Encapsulation Mechanism, Tiger
Abstract Statistics
Cite this article


Keywords: Post-Quantum Cryptography, KpqC Competition, Key Encapsulation Mechanism, Tiger
Abstract Statistics
Cite this article
[IEEE Style]
이주희, 이은민, 김지승, "Security Analysis on TiGER KEM in KpqC Round 1 Competition Using Meet-LWE Attack," Journal of The Korea Institute of Information Security and Cryptology, vol. 33, no. 5, pp. 709-719, 2023. DOI: 10.13089/JKIISC.2023.33.5.709.
[ACM Style]
이주희, 이은민, and 김지승. 2023. Security Analysis on TiGER KEM in KpqC Round 1 Competition Using Meet-LWE Attack. Journal of The Korea Institute of Information Security and Cryptology, 33, 5, (2023), 709-719. DOI: 10.13089/JKIISC.2023.33.5.709.