{"id":"https://openalex.org/W4414869118","doi":"https://doi.org/10.62056/a0qj5wol7","title":"Efficient Weak Key Recovery for QC-MDPC Codes like BIKE","display_name":"Efficient Weak Key Recovery for QC-MDPC Codes like BIKE","publication_year":2025,"publication_date":"2025-10-06","ids":{"openalex":"https://openalex.org/W4414869118","doi":"https://doi.org/10.62056/a0qj5wol7"},"language":"en","primary_location":{"id":"doi:10.62056/a0qj5wol7","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a0qj5wol7","pdf_url":"https://cic.iacr.org/p/2/3/37/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://cic.iacr.org/p/2/3/37/pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030137956","display_name":"Tim Gellersen","orcid":null},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Tim Gellersen","raw_affiliation_strings":["University of Luebeck"],"affiliations":[{"raw_affiliation_string":"University of Luebeck","institution_ids":["https://openalex.org/I9341345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119867106","display_name":"Till Eifert","orcid":null},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Till Eifert","raw_affiliation_strings":["University of Luebeck"],"affiliations":[{"raw_affiliation_string":"University of Luebeck","institution_ids":["https://openalex.org/I9341345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017991461","display_name":"Sebastian Berndt","orcid":"https://orcid.org/0000-0003-4177-8081"},"institutions":[{"id":"https://openalex.org/I4210127057","display_name":"Technical University of Applied Sciences L\u00fcbeck","ror":"https://ror.org/032xqbj11","country_code":"DE","type":"education","lineage":["https://openalex.org/I4210127057"]},{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Sebastian Berndt","raw_affiliation_strings":["Technische Hochschule L\u00fcbeck","University of Luebeck"],"affiliations":[{"raw_affiliation_string":"Technische Hochschule L\u00fcbeck","institution_ids":["https://openalex.org/I4210127057"]},{"raw_affiliation_string":"University of Luebeck","institution_ids":["https://openalex.org/I9341345"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075079896","display_name":"Thomas Eisenbarth","orcid":"https://orcid.org/0000-0003-1116-6973"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thomas Eisenbarth","raw_affiliation_strings":["University of Luebeck"],"affiliations":[{"raw_affiliation_string":"University of Luebeck","institution_ids":["https://openalex.org/I9341345"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5030137956"],"corresponding_institution_ids":["https://openalex.org/I9341345"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31569325,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13182","display_name":"Quantum-Dot Cellular Automata","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6773999929428101},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.6403999924659729},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6061000227928162},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5435000061988831},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4884999990463257},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.37610000371932983},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3582000136375427},{"id":"https://openalex.org/keywords/error-detection-and-correction","display_name":"Error detection and correction","score":0.3165999948978424}],"concepts":[{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6773999929428101},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.6403999924659729},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6061000227928162},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5435000061988831},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5429999828338623},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4884999990463257},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.42739999294281006},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.42649999260902405},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.37610000371932983},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3582000136375427},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3337000012397766},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.325300008058548},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.3165999948978424},{"id":"https://openalex.org/C156778621","wikidata":"https://www.wikidata.org/wiki/Q1365748","display_name":"Spectrum (functional analysis)","level":2,"score":0.30140000581741333},{"id":"https://openalex.org/C113328881","wikidata":"https://www.wikidata.org/wiki/Q599809","display_name":"Dictionary attack","level":3,"score":0.29249998927116394},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.28209999203681946},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.27160000801086426},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.2599000036716461},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.25529998540878296},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2517000138759613},{"id":"https://openalex.org/C105344744","wikidata":"https://www.wikidata.org/wiki/Q958957","display_name":"Spread spectrum","level":3,"score":0.25049999356269836},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.25}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.62056/a0qj5wol7","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a0qj5wol7","pdf_url":"https://cic.iacr.org/p/2/3/37/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.62056/a0qj5wol7","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a0qj5wol7","pdf_url":"https://cic.iacr.org/p/2/3/37/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2240602390","display_name":null,"funder_award_id":"16KISR010K","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"},{"id":"https://openalex.org/G5627006531","display_name":null,"funder_award_id":"16KIS1837","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"}],"funders":[{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"},{"id":"https://openalex.org/F4320323104","display_name":"Kuwait Institute for Scientific Research","ror":"https://ror.org/041tgg678"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414869118.pdf","grobid_xml":"https://content.openalex.org/works/W4414869118.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W72398006","https://openalex.org/W1611563112","https://openalex.org/W2020457125","https://openalex.org/W2103398070","https://openalex.org/W2520683369","https://openalex.org/W2562330807","https://openalex.org/W2625890935","https://openalex.org/W2795083828","https://openalex.org/W2897128759","https://openalex.org/W2902198978","https://openalex.org/W2986959318","https://openalex.org/W2990146978","https://openalex.org/W3004081457","https://openalex.org/W3157673917","https://openalex.org/W3161256338","https://openalex.org/W3212699958","https://openalex.org/W4213024125","https://openalex.org/W4281676495","https://openalex.org/W4285227183","https://openalex.org/W4385654261","https://openalex.org/W4396821501"],"related_works":[],"abstract_inverted_index":{"Code-based":[0],"cryptography,":[1],"originally":[2],"proposed":[3,174],"nearly":[4],"50":[5],"years":[6],"ago,":[7],"has":[8,108],"been":[9,134],"highly":[10,89],"successful":[11],"in":[12,139,217],"the":[13,28,34,57,67,70,78,92,118,125,140,189,194,200,204,221],"NIST":[14],"standardization":[15],"process":[16],"for":[17,83],"post-quantum":[18],"key":[19,171,184],"encapsulation":[20],"mechanisms.":[21],"With":[22],"HQC":[23],"and":[24,77,91],"BIKE,":[25],"two":[26],"of":[27,36,66,102,128,143,203,220],"considered":[29],"candidates":[30],"are":[31,88],"based":[32],"on":[33,104,110],"hardness":[35],"quasi-cyclic":[37,105],"codes.":[38],"One":[39],"important":[40],"attack":[41,63,93,225],"first":[42],"presented":[43],"by":[44,175,198],"Guo":[45,176],"et":[46,177],"al.":[47,178],"at":[48],"ASIACRYPT":[49],"2016":[50],"that":[51,152,165],"targets":[52],"moderately":[53],"dense":[54],"codes":[55],"is":[56],"distance":[58,126,160,201],"spectrum":[59,127,161,202],"recovery":[60,172,185,196],"attack.":[61],"The":[62],"makes":[64],"use":[65],"correlation":[68],"between":[69],"error":[71],"patterns":[72],"causing":[73],"a":[74,137,158,182,213],"decryption":[75],"failure":[76],"sparse":[79],"private":[80],"key.":[81],"However,":[82,122],"random":[84],"keys,":[85],"decoding":[86,222],"failures":[87],"unlikely":[90],"thus":[94],"only":[95],"succeeds":[96],"with":[97,113,169,208],"negligible":[98],"probability.":[99,210],"Another":[100],"line":[101],"cryptanalysis":[103,141],"code-based":[106,145],"cryptosystems":[107],"focused":[109],"weak":[111,130,155,206],"keys":[112,131,156,207],"higher":[114],"DFR,":[115],"which":[116],"invalidate":[117],"provable":[119],"security":[120],"guarantees.":[121],"so":[123],"far":[124],"such":[129],"have":[132],"never":[133],"analyzed,":[135],"leaving":[136],"gap":[138],"research":[142],"modern":[144],"cryptosystems.":[146],"In":[147],"this":[148],"work,":[149],"we":[150,180],"show":[151],"Type":[153],"I":[154],"feature":[157],"new":[159,183,205],"not":[162],"analyzed":[163],"before":[164],"cannot":[166],"be":[167,227],"attacked":[168],"known":[170],"techniques":[173],"Instead,":[179],"introduce":[181],"algorithm":[186],"that,":[187],"considering":[188,212],"reaction":[190],"attacker":[191],"setting,":[192],"exceeds":[193],"state-of-the-art":[195],"methods":[197],"exploiting":[199],"high":[209],"When":[211],"natural":[214],"side-channel":[215],"occurring":[216],"real-world":[218],"implementations":[219],"phase,":[223],"our":[224],"can":[226],"enhanced":[228],"even":[229],"further.":[230]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
