conference paper
When Stream Cipher Analysis Meets Public-Key Cryptography
2007
Selected Areas in Cryptography. SAC 2006
Inspired by fast correlation attacks on stream ciphers, we present a stream cipher-like construction for a public-key cryptosystem whose security relies on two problems: finding a low-weight multiple of a given polynomial and a Hidden Correlation problem. We obtain a weakly secure public-key cryptosystem we call TCHo (as for Trapdoor Cipher, Hardware Oriented). Using the Fujisaki-Okamoto construction, we can build an hybrid cryptosystem, TCHon-FO, resistant against adaptive chosen ciphertext attacks.
Type
conference paper
Web of Science ID
WOS:000251036300019
Author(s)
Date Issued
2007
Publisher
Published in
Selected Areas in Cryptography. SAC 2006
Series title/Series vol.
Lecture Notes in Computer Science; 4356
Start page
266
End page
284
Editorial or Peer reviewed
REVIEWED
Written at
EPFL
EPFL units
Event name | Event place | Event date |
Montreal, Canada | August 17-18, 2006 | |
Available on Infoscience
August 27, 2007
Use this identifier to reference this record