{"id":"https://openalex.org/W4313335294","doi":"https://doi.org/10.1093/comjnl/bxac176","title":"Key Reuse Attacks on Post-quantum Cryptosystems, Revisited","display_name":"Key Reuse Attacks on Post-quantum Cryptosystems, Revisited","publication_year":2022,"publication_date":"2022-12-16","ids":{"openalex":"https://openalex.org/W4313335294","doi":"https://doi.org/10.1093/comjnl/bxac176"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxac176","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxac176","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100360143","display_name":"Ke Wang","orcid":"https://orcid.org/0000-0003-1435-7118"},"institutions":[{"id":"https://openalex.org/I163151501","display_name":"Hangzhou Normal University","ror":"https://ror.org/014v1mr15","country_code":"CN","type":"education","lineage":["https://openalex.org/I163151501"]},{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ke Wang","raw_affiliation_strings":["Department of Cryptography and Technology, Beijing Electronic Science and Technology Institute , Beijing, China","Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University , Hangzhou 311121 , China"],"affiliations":[{"raw_affiliation_string":"Department of Cryptography and Technology, Beijing Electronic Science and Technology Institute , Beijing, China","institution_ids":["https://openalex.org/I202334528"]},{"raw_affiliation_string":"Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University , Hangzhou 311121 , China","institution_ids":["https://openalex.org/I163151501"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100731773","display_name":"Zhenfeng Zhang","orcid":"https://orcid.org/0000-0002-0013-3685"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenfeng Zhang","raw_affiliation_strings":["Institute of Software, Chinese Academy of Sciences , Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, Chinese Academy of Sciences , Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070341191","display_name":"Haodong Jiang","orcid":"https://orcid.org/0000-0001-6760-5336"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Haodong Jiang","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing , Zhengzhou, Henan , China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing , Zhengzhou, Henan , China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036189156","display_name":"Huiqin Xie","orcid":"https://orcid.org/0000-0003-1466-3705"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huiqin Xie","raw_affiliation_strings":["Department of Cryptography and Technology, Beijing Electronic Science and Technology Institute , Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Cryptography and Technology, Beijing Electronic Science and Technology Institute , Beijing, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100382134","display_name":"Yanjun Li","orcid":"https://orcid.org/0000-0003-3314-3764"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanjun Li","raw_affiliation_strings":["North China Institute of Computing Technology , Beijing, China"],"affiliations":[{"raw_affiliation_string":"North China Institute of Computing Technology , Beijing, China","institution_ids":["https://openalex.org/I4210090176"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100649794","display_name":"Ying Sun","orcid":"https://orcid.org/0000-0002-7224-6726"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Sun","raw_affiliation_strings":["Department of Cryptography and Technology, Beijing Electronic Science and Technology Institute , Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Cryptography and Technology, Beijing Electronic Science and Technology Institute , Beijing, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064458680","display_name":"Lidong Han","orcid":"https://orcid.org/0000-0003-2094-5629"},"institutions":[{"id":"https://openalex.org/I163151501","display_name":"Hangzhou Normal University","ror":"https://ror.org/014v1mr15","country_code":"CN","type":"education","lineage":["https://openalex.org/I163151501"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lidong Han","raw_affiliation_strings":["Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University , Hangzhou 311121 , China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University , Hangzhou 311121 , China","institution_ids":["https://openalex.org/I163151501"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100360143"],"corresponding_institution_ids":["https://openalex.org/I163151501","https://openalex.org/I202334528"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.1326,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.55342625,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"67","issue":"1","first_page":"323","last_page":"337"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.763137936592102},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.7445375323295593},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6412597894668579},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5850673317909241},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.5676155090332031},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.5156799554824829},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5103382468223572},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.4733048975467682},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4692803621292114},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4154518246650696},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3841366469860077},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.35832324624061584},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.23720768094062805},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.13788405060768127}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.763137936592102},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.7445375323295593},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6412597894668579},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5850673317909241},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.5676155090332031},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.5156799554824829},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5103382468223572},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.4733048975467682},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4692803621292114},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4154518246650696},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3841366469860077},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35832324624061584},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.23720768094062805},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.13788405060768127},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxac176","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxac176","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1513904472","https://openalex.org/W1985439922","https://openalex.org/W2007466965","https://openalex.org/W2168676717","https://openalex.org/W2398538644","https://openalex.org/W2418806234","https://openalex.org/W2752929869","https://openalex.org/W2790345837","https://openalex.org/W2866028610","https://openalex.org/W3004134347","https://openalex.org/W3029186567","https://openalex.org/W3082551154","https://openalex.org/W3167847626","https://openalex.org/W4297991408"],"related_works":["https://openalex.org/W1599829249","https://openalex.org/W2521075147","https://openalex.org/W3190590199","https://openalex.org/W1950779939","https://openalex.org/W2143542235","https://openalex.org/W3013039523","https://openalex.org/W3202989673","https://openalex.org/W101098056","https://openalex.org/W34792146","https://openalex.org/W2296709588"],"abstract_inverted_index":{"Abstract":[0],"The":[1,160],"National":[2],"Institute":[3],"of":[4,14,22,25,35,46,77,138,146,164,182],"Standards":[5],"and":[6,17,101,105,108,143,162],"Technology":[7],"(NIST)":[8],"has":[9],"been":[10],"working":[11],"on":[12,168],"standardization":[13],"post-quantum":[15],"cryptography":[16],"is":[18,31,189],"approaching":[19],"the":[20,42,68,80,93,134,165,169,177,192],"end":[21],"round-3":[23,98],"evaluation":[24,30],"algorithms.":[26],"Key":[27],"reuse":[28,44],"security":[29,45],"an":[32,74,129,157],"important":[33],"part":[34],"algorithm":[36],"evaluation.":[37],"In":[38,124,172],"order":[39],"to":[40,132],"evaluate":[41],"key":[43,58],"candidate":[47],"IND-CPA":[48,139],"PKEs,":[49],"at":[50],"Eurocrypt\u201919,":[51],"B$\\breve{\\text{a}}$etu":[52],"et":[53,110],"al.":[54,111],"proposed":[55],"a":[56],"classical":[57],"recovery":[59],"under":[60],"plaintext":[61],"checking":[62],"attack":[63],"(KR-PCA)":[64],"which":[65,87,119,188],"can":[66,175],"recover":[67,133,176],"reused":[69,135],"secret":[70,136,178],"keys":[71,137,179],"by":[72,90],"querying":[73],"oracle":[75],"thousands":[76,181],"times.":[78],"However,":[79],"method":[81,131,151,166],"does":[82],"not":[83],"work":[84],"for":[85],"cryptosystems":[86],"shorten":[88],"ciphertexts":[89],"rounding":[91],"off":[92],"low":[94],"bits,":[95],"such":[96],"as":[97],"finalists":[99],"Kyber":[100,142],"Saber.":[102,144],"Subsequently,":[103],"Dumittan":[104],"Vaudenay":[106],"(ACNS\u201920)":[107],"Qin":[109],"(ASIACRYPT\u201921)":[112],"came":[113],"up":[114],"with":[115,156,191],"new":[116],"effective":[117],"methods,":[118],"require":[120],"carefully":[121],"constructed":[122],"queries.":[123],"this":[125],"paper,":[126],"we":[127,174],"propose":[128],"automatic":[130],"PKEs":[140],"in":[141,184],"Instead":[145],"constructing":[147],"queries":[148,183],"carefully,":[149],"our":[150],"uses":[152],"automated":[153],"search":[154],"combined":[155],"optimized":[158],"bruteforce.":[159],"effect":[161],"cost":[163],"depend":[167],"specific":[170],"parameters.":[171],"particular,":[173],"after":[180],"all":[185],"parameter":[186],"sets,":[187],"comparable":[190],"current":[193],"best":[194],"result.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-07T23:40:59.601060","created_date":"2025-10-10T00:00:00"}
