{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T19:53:48Z","timestamp":1776455628555,"version":"3.51.2"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032018540","type":"print"},{"value":"9783032018557","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-01855-7_8","type":"book-chapter","created":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T09:20:54Z","timestamp":1755508854000},"page":"221-252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Error Floor Prediction with\u00a0Markov Models for\u00a0QC-MDPC Codes"],"prefix":"10.1007","author":[{"given":"Sarah","family":"Arpin","sequence":"first","affiliation":[]},{"given":"Jun Bo","family":"Lau","sequence":"additional","affiliation":[]},{"given":"Antoine","family":"Mesnard","sequence":"additional","affiliation":[]},{"given":"Ray","family":"Perlner","sequence":"additional","affiliation":[]},{"given":"Angela","family":"Robinson","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Tillich","sequence":"additional","affiliation":[]},{"given":"Valentin","family":"Vasseur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,17]]},"reference":[{"key":"8_CR1","unstructured":"Aragon, N., et al.: BIKE: bit flipping key encapsulation - SPEC V4.2 (2021). https:\/\/bikesuite.org\/files\/v4.2\/BIKE_Spec.2021.07.26.1.pdf"},{"key":"8_CR2","doi-asserted-by":"publisher","unstructured":"Arpin, S., Billingsley, T.R., Hast, D.R., Lau, J.B., Perlner, R.A., Robinson, A.: A study of error floor behavior in QC-MDPC codes. In: Cheon, J.H., Johansson, T. (eds.) PQCrypto 2022, LNCS, vol. 13512, pp. 89\u2013103. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17234-2_5","DOI":"10.1007\/978-3-031-17234-2_5"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Annechini, A., Barenghi, A., Pelosi, G.: Bit-flipping decoder failure rate estimation for $$(v, w)-$$regular codes. In: Proceedings of IEEE International Symposium on Information Theory - ISIT, pp. 3374\u20133379. IEEE (2024)","DOI":"10.1109\/ISIT57864.2024.10619629"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Annechini, A., Barenghi, A., Pelosi, G.: Bit-flipping decoder failure rate estimation for $$(v, w)-$$regular codes. CoRR, abs\/2401.16919 (2024)","DOI":"10.1109\/ISIT57864.2024.10619629"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Arpin, S., et al.: Error floor prediction with Markov models for QC-MDPC codes. Cryptology ePrint Archive, Paper 2025\/153 (2025)","DOI":"10.1007\/978-3-032-01855-7_8"},{"key":"8_CR6","doi-asserted-by":"publisher","unstructured":"Baldi, M., Barenghi, A., Chiaraluce, F., Pelosi, G., Santini, P.: Performance bounds for QC-MDPC codes decoders. In: Wachter-Zeh, A., Bartz, H., Liva, G. (eds.) CBCrypto 2021. LNCS, vol. 13150, pp. 95\u2013122. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-98365-9_6","DOI":"10.1007\/978-3-030-98365-9_6"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-030-44223-1_3","volume-title":"Post-Quantum Cryptography","author":"N Drucker","year":"2020","unstructured":"Drucker, N., Gueron, S., Kostic, D.: QC-MDPC decoders with several shades of gray. In: Ding, J., Tillich, J.-P. (eds.) PQCrypto 2020. LNCS, vol. 12100, pp. 35\u201350. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44223-1_3"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Gallager, R.G.: Low Density Parity Check Codes. M.I.T. Press, Cambridge, Massachusetts (1963)","DOI":"10.7551\/mitpress\/4347.001.0001"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1007\/978-3-662-53887-6_29","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"Q Guo","year":"2016","unstructured":"Guo, Q., Johansson, T., Stankovski, P.: A key recovery attack on MDPC with CCA security using decoding errors. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10031, pp. 789\u2013815. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_29"},{"issue":"5","key":"8_CR10","doi-asserted-by":"publisher","first-page":"3411","DOI":"10.1109\/TIT.2018.2799627","volume":"64","author":"Y Hashemi","year":"2018","unstructured":"Hashemi, Y., Banihashemi, A.H.: Characterization of elementary trapping sets in irregular LDPC codes and the corresponding efficient exhaustive search algorithms. IEEE Trans. Inf. Theory 64(5), 3411\u20133430 (2018)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/978-3-319-70500-2_12","volume-title":"Theory of Cryptography","author":"D Hofheinz","year":"2017","unstructured":"Hofheinz, D., H\u00f6velmanns, K., Kiltz, E.: A modular analysis of the Fujisaki-Okamoto transformation. In: Kalai, Y., Reyzin, L. (eds.) TCC 2017. LNCS, vol. 10677, pp. 341\u2013371. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70500-2_12"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Nosouhi, M.R., et al.: Weak-key analysis for BIKE post-quantum key encapsulation mechanism. IEEE Trans. Inf. Forensics Secur. 18, 2160\u20132174 (2023)","DOI":"10.1109\/TIFS.2023.3264153"},{"key":"8_CR13","unstructured":"Richardson, T.: Error floors of LDPC codes. In: Proceedings of the 41th Annual Allerton Conference on Communication, Control, and Computing, vol.\u00a041, pp. 1426\u20131435 (2003)"},{"key":"8_CR14","unstructured":"Sendrier, N.: BIKE decoding failure \u2013 weak keys & error floors. In: Slides of the Panel Discussion of the Fifth PQC Standardization Conference, April 2024"},{"key":"8_CR15","unstructured":"Sendrier, N., Vasseur, V.: About low DFR for QC-MDPC decoding. Cryptology ePrint Archive, Paper 2019\/1434 (2019). https:\/\/eprint.iacr.org\/2019\/1434"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/978-3-030-25510-7_22","volume-title":"Post-Quantum Cryptography","author":"N Sendrier","year":"2019","unstructured":"Sendrier, N., Vasseur, V.: On the decoding failure rate of QC-MDPC bit-flipping decoders. In: Ding, J., Steinwandt, R. (eds.) PQCrypto 2019. LNCS, vol. 11505, pp. 404\u2013416. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-25510-7_22"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Tanner, R.M.: A recursive approach to low complexity codes. IEEE Trans. Inform. Theory 27(5), 533\u2013547 (1981)","DOI":"10.1109\/TIT.1981.1056404"},{"key":"8_CR18","unstructured":"Vasseur, V.: Post-quantum cryptography: a study of the decoding of QC-MDPC codes. Ph.D. thesis, Universit\u00e9 de Paris, March 2021"},{"key":"8_CR19","unstructured":"Vasseur, V.: qcmdpc_markov Github codebase (2024). Accessed 26 Aug 2024"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Vasi\u0107, B., Chilappagari, S.K., Nguyen, D.V.: Chapter 6 - failures and error floors of iterative decoders. In: Declerq, D., Fossorier, M., Biglieri, E. (eds.) Academic Press Library in Mobile and Wireless Communications, pp. 299\u2013341. Academic Press, Oxford (2014)","DOI":"10.1016\/B978-0-12-396499-1.00006-6"},{"key":"8_CR21","doi-asserted-by":"publisher","unstructured":"Wang, T., Wang, A., Wang, X.: Exploring decryption failures of BIKE: new class of weak keys and key recovery attacks. In: Handschuh, H., Lysyanskaya, A. (eds.) CRYPTO 2023. LNCS, vol. 14083, pp. 70\u2013100. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-38548-3_3","DOI":"10.1007\/978-3-031-38548-3_3"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-01855-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T19:21:42Z","timestamp":1768850502000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-01855-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032018540","9783032018557"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-01855-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRYPTO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Cryptology Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santa Barbara, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"45","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crypto2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crypto.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}