{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:38:53Z","timestamp":1743129533874,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031828515"},{"type":"electronic","value":"9783031828522"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82852-2_11","type":"book-chapter","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T13:02:05Z","timestamp":1741784525000},"page":"237-255","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Post-Quantum Backdoor for\u00a0Kyber-KEM"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-3433-6165","authenticated-orcid":false,"given":"Wenwen","family":"Xia","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1000-7903","authenticated-orcid":false,"given":"Geng","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0504-9538","authenticated-orcid":false,"given":"Dawu","family":"Gu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"key":"11_CR1","unstructured":"Avanzi, R., et\u00a0al.: Classic McEliece: conservative code-based cryptography. NIST PQC Round 4 Submissions (2022)"},{"key":"11_CR2","unstructured":"Avanzi, R., et al.: Crystals-kyber algorithm specifications and supporting documentation (version 3.0). NIST PQC Round 3 submissions (2020)"},{"key":"11_CR3","unstructured":"Alkim, E., Ducas, L., P\u00f6ppelmann, T., Schwabe, P.: Post-quantum key exchange - a new hope. In: Holz, T., Savage, S. (eds.) 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016, pp. 327\u2013343. USENIX Association (2016)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Hamburg, M., Krasnova, A., Lange, T.: Elligator: elliptic-curve points indistinguishable from uniform random strings. In: Sadeghi, A.R., Gligor, V.D, Yung, M. (eds.). In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS\u201913, Berlin, Germany, November 4-8, 2013, pp. 967\u2013980. ACM (2013)","DOI":"10.1145\/2508859.2516734"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"EBerlekamp, E., McEliece, R., Van Tilborg, H.: On the inherent intractability of certain coding problems (corresp.). IEEE Trans. Inf. Theory 24(3), 384\u2013386 (1978)","DOI":"10.1109\/TIT.1978.1055873"},{"key":"11_CR6","unstructured":"Brown, R.G.: Dieharder: a random number test suite. https:\/\/webhome.phy.duke.edu\/~rgb\/General\/dieharder.php"},{"key":"11_CR7","unstructured":"Hemmert, T.: How to backdoor LWE-like cryptosystems. IACR Cryptol. ePrint Arch., 1381 (2022)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Kwant, R., Lange, T., Thissen, K.: Lattice klepto - turning post-quantum crypto against itself. In: Adams, C., Camenisch, J., (eds.) Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. LNCS, vol. 10719, pp. 336\u2013354. Springer (2017)","DOI":"10.1007\/978-3-319-72565-9_17"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"L\u2019Ecuyer, P., Simard, R.: TestU01: AC library for empirical testing of random number generators. ACM Trans. Math. Softw. 33(4), 22:1\u201322:40 (2007)","DOI":"10.1145\/1268776.1268777"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Petura, O., Mureddu, U., Bochard, N., Fischer, V., Bossuet, L.: A survey of AIS-20\/31 compliant TRNG cores suitable for FPGA devices. In: 2016 26th International Conference on Field Programmable Logic and Applications (FPL), pp. 1\u201310 (2016)","DOI":"10.1109\/FPL.2016.7577379"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Ravi, P., Bhasin, S., Chattopadhyay, A., Aikata, A., Sinha\u00a0Roy, S.: Backdooring post-quantum cryptography: kleptographic attacks on lattice-based KEMs. In: Proceedings of the Great Lakes Symposium on VLSI 2024, GLSVLSI \u201924, pp. 216\u2013221, New York, NY, USA, 2024. Association for Computing Machinery (2024)","DOI":"10.1145\/3649476.3660373"},{"key":"11_CR12","unstructured":"Rukhin, A., et al.: A statistical test suite for random and pseudorandom number generators for cryptographic applications, Technical Report NIST Special Publication (SP) 800-22 Rev. 1, National Institute of Standards and Technology (2010)"},{"issue":"8","key":"11_CR13","doi-asserted-by":"publisher","first-page":"1228","DOI":"10.1093\/comjnl\/bxy060","volume":"61","author":"D Xiao","year":"2018","unstructured":"Xiao, D., Yang, Yu.: Klepto for ring-LWE encryption. Comput. J. 61(8), 1228\u20131239 (2018)","journal-title":"Comput. J."},{"issue":"4","key":"11_CR14","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1093\/comjnl\/bxz084","volume":"63","author":"Z Yang","year":"2020","unstructured":"Yang, Z., Chen, R., Li, C., Longjiang, Q., Yang, G.: On the security of LWE cryptosystem against subversion attacks. Comput. J. 63(4), 495\u2013507 (2020)","journal-title":"Comput. J."},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Yang, Z., Xie, T., Pan, Y.: Lattice Klepto revisited. In: Sun, H.M., Shieh, S.-P., Gu, G., Ateniese, G. (eds.) ASIA CCS \u201920: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020, pp. 867\u2013873. ACM (2020)","DOI":"10.1145\/3320269.3384768"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/3-540-69053-0_6","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201997","author":"A Young","year":"1997","unstructured":"Young, A., Yung, M.: Kleptography: using cryptography against cryptography. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 62\u201374. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/3-540-69053-0_6"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/BFb0052241","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201997","author":"A Young","year":"1997","unstructured":"Young, A., Yung, M.: The prevalence of kleptographic attacks on discrete-log based cryptosystems. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 264\u2013276. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0052241"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Young, A.L., Yung, M.: Cryptography as an attack technology: proving the RSA\/factoring kleptographic attack. In: Ryan, P., Naccache, D., Quisquater, J.J. (eds.) The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. LNCS, vol. 9100, pp. 243\u2013255. Springer (2016)","DOI":"10.1007\/978-3-662-49301-4_16"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82852-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T13:02:12Z","timestamp":1741784532000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82852-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031828515","9783031828522"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82852-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Selected Areas in Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montreal, QC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sacworkshop.org\/SAC24\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}