{"id":"https://openalex.org/W4303699843","doi":"https://doi.org/10.3390/e24101418","title":"Quantum Misuse Attack on Frodo","display_name":"Quantum Misuse Attack on Frodo","publication_year":2022,"publication_date":"2022-10-04","ids":{"openalex":"https://openalex.org/W4303699843","doi":"https://doi.org/10.3390/e24101418","pmid":"https://pubmed.ncbi.nlm.nih.gov/37420438"},"language":"en","primary_location":{"id":"doi:10.3390/e24101418","is_oa":true,"landing_page_url":"https://doi.org/10.3390/e24101418","pdf_url":"https://www.mdpi.com/1099-4300/24/10/1418/pdf?version=1665710735","source":{"id":"https://openalex.org/S195231649","display_name":"Entropy","issn_l":"1099-4300","issn":["1099-4300"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj","pubmed"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1099-4300/24/10/1418/pdf?version=1665710735","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100721065","display_name":"Yaru Wang","orcid":"https://orcid.org/0000-0002-4437-144X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yaru Wang","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070341191","display_name":"Haodong Jiang","orcid":"https://orcid.org/0000-0001-6760-5336"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Haodong Jiang","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041902006","display_name":"Zhi Ma","orcid":"https://orcid.org/0000-0002-8946-3655"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zhi Ma","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5041902006","https://openalex.org/A5070341191"],"corresponding_institution_ids":[],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165},"fwci":0.5551,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.72527759,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"24","issue":"10","first_page":"1418","last_page":"1418"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6545295119285583},{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.6459253430366516},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5998564958572388},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5466095805168152},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5352697372436523},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.526372492313385},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5144884586334229},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.48445606231689453},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4558109939098358},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.4547831118106842},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.4395020604133606},{"id":"https://openalex.org/keywords/ciphertext-indistinguishability","display_name":"Ciphertext indistinguishability","score":0.43887725472450256},{"id":"https://openalex.org/keywords/quantum-key-distribution","display_name":"Quantum key distribution","score":0.4229298233985901},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.41977059841156006},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41465485095977783},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3974107503890991},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3864751160144806},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.34551042318344116},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.32002657651901245},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.1660863757133484},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.14854389429092407},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1185910701751709}],"concepts":[{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6545295119285583},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.6459253430366516},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5998564958572388},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5466095805168152},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5352697372436523},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.526372492313385},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5144884586334229},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.48445606231689453},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4558109939098358},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.4547831118106842},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.4395020604133606},{"id":"https://openalex.org/C182776695","wikidata":"https://www.wikidata.org/wiki/Q840661","display_name":"Ciphertext indistinguishability","level":5,"score":0.43887725472450256},{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.4229298233985901},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.41977059841156006},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41465485095977783},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3974107503890991},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3864751160144806},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.34551042318344116},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.32002657651901245},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.1660863757133484},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.14854389429092407},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1185910701751709},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.3390/e24101418","is_oa":true,"landing_page_url":"https://doi.org/10.3390/e24101418","pdf_url":"https://www.mdpi.com/1099-4300/24/10/1418/pdf?version=1665710735","source":{"id":"https://openalex.org/S195231649","display_name":"Entropy","issn_l":"1099-4300","issn":["1099-4300"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy","raw_type":"journal-article"},{"id":"pmid:37420438","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/37420438","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy (Basel, Switzerland)","raw_type":null},{"id":"pmh:oai:doaj.org/article:87d2c37ca5714592a5dbcaadb205a1e1","is_oa":true,"landing_page_url":"https://doaj.org/article/87d2c37ca5714592a5dbcaadb205a1e1","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Entropy, Vol 24, Iss 10, p 1418 (2022)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/1099-4300/24/10/1418/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/e24101418","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Entropy; Volume 24; Issue 10; Pages: 1418","raw_type":"Text"},{"id":"pmh:oai:pubmedcentral.nih.gov:9601586","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/9601586","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Entropy (Basel)","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/e24101418","is_oa":true,"landing_page_url":"https://doi.org/10.3390/e24101418","pdf_url":"https://www.mdpi.com/1099-4300/24/10/1418/pdf?version=1665710735","source":{"id":"https://openalex.org/S195231649","display_name":"Entropy","issn_l":"1099-4300","issn":["1099-4300"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.47999998927116394,"id":"https://metadata.un.org/sdg/17"}],"awards":[{"id":"https://openalex.org/G2767636984","display_name":null,"funder_award_id":"62002385","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3862064922","display_name":null,"funder_award_id":"2021M703321","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G8658462202","display_name":null,"funder_award_id":"61972413","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4303699843.pdf","grobid_xml":"https://content.openalex.org/works/W4303699843.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W1598269861","https://openalex.org/W1607264302","https://openalex.org/W1809974132","https://openalex.org/W2007466965","https://openalex.org/W2090963060","https://openalex.org/W2095374884","https://openalex.org/W2106970188","https://openalex.org/W2156186849","https://openalex.org/W2168676717","https://openalex.org/W2494078997","https://openalex.org/W2593446182","https://openalex.org/W2739993935","https://openalex.org/W2795139011","https://openalex.org/W2914825969","https://openalex.org/W2946106366","https://openalex.org/W2947116917","https://openalex.org/W2952991984","https://openalex.org/W3003161435","https://openalex.org/W3004134347","https://openalex.org/W3029186567","https://openalex.org/W3144672608","https://openalex.org/W4225120251","https://openalex.org/W4232836212","https://openalex.org/W6676339310","https://openalex.org/W6724049718","https://openalex.org/W6773382638","https://openalex.org/W6793389274","https://openalex.org/W6810669955"],"related_works":["https://openalex.org/W2883034031","https://openalex.org/W3127629500","https://openalex.org/W2895855268","https://openalex.org/W2061949491","https://openalex.org/W4386066492","https://openalex.org/W3172324685","https://openalex.org/W4298094689","https://openalex.org/W3165155389","https://openalex.org/W2950169363","https://openalex.org/W3157575264"],"abstract_inverted_index":{"Research":[0],"on":[1,87,153],"the":[2,17,21,40,71,74,100,109,122,125,134,160,166,176,185],"security":[3,72,95,161],"of":[4,16,20,24,73,77,102,162,169,178],"lattice-based":[5],"public-key":[6],"encryption":[7],"schemes":[8],"against":[9],"misuse":[10],"attacks":[11,57,67],"is":[12,96],"an":[13],"important":[14],"part":[15],"cryptographic":[18],"assessment":[19],"National":[22],"Institute":[23],"Standards":[25],"and":[26,59,111,132,158],"Technology":[27],"(NIST)":[28],"post-quantum":[29],"cryptography":[30],"(PQC)":[31],"standardization":[32],"process.":[33],"In":[34,82],"particular,":[35],"many":[36],"NIST-PQC":[37],"cryptosystems":[38],"follow":[39],"same":[41,186],"meta-cryptosystem.":[42],"At":[43],"EUROCRYPT":[44],"2019,":[45],"Ba\u02d8etu":[46,170],"et":[47,171],"al.":[48],"mounted":[49],"a":[50,60,128,147],"classical":[51],"key":[52,62,149],"recovery":[53,63,150],"under":[54,64,155],"plaintext":[55],"checking":[56],"(KR-PCA)":[58],"quantum":[61,112,116,138,148],"chosen":[65],"ciphertext":[66],"(KR-CCA).":[68],"They":[69],"analyzed":[70],"weak":[75],"version":[76],"nine":[78],"submissions":[79],"to":[80,99,182],"NIST.":[81],"this":[83],"paper,":[84],"we":[85,120,145],"focus":[86],"learning":[88],"with":[89,165,184],"error":[90],"(LWE)-based":[91],"FrodoPKE,":[92],"whose":[93],"IND-CPA":[94],"tightly":[97],"related":[98],"hardness":[101],"plain":[103],"LWE":[104,117,139,154],"problems.":[105,118],"We":[106],"first":[107],"review":[108],"meta-cryptosystem":[110],"algorithm":[113,151],"for":[114,137],"solving":[115],"Then,":[119],"consider":[121],"case":[123],"where":[124],"noise":[126],"follows":[127],"discrete":[129],"Gaussian":[130],"distribution":[131],"recompute":[133],"success":[135,187],"probability":[136],"by":[140],"using":[141],"Hoeffding":[142],"bound.":[143],"Finally,":[144],"give":[146],"based":[152],"CCA":[156],"attack":[157],"analyze":[159],"Frodo.":[163],"Compared":[164],"existing":[167],"work":[168],"al.,":[172],"our":[173],"method":[174],"reduces":[175],"number":[177],"queries":[179],"from":[180],"22":[181],"1":[183],"probability.":[188]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
