{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T11:07:14Z","timestamp":1775732834952,"version":"3.50.1"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032226976","type":"print"},{"value":"9783032226983","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-22698-3_8","type":"book-chapter","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T10:23:29Z","timestamp":1775730209000},"page":"242-274","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Breaking RHQC\u2019s Post-Compromise Security"],"prefix":"10.1007","author":[{"given":"Philippe","family":"Gaborit","sequence":"first","affiliation":[]},{"given":"Philippe","family":"Krej\u010d\u00ed","sequence":"additional","affiliation":[]},{"given":"Cristina","family":"Onete","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,10]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","unstructured":"Alwen, J., Coretti, S., Dodis, Y.: The double ratchet: Security notions, proofs, and modularization for the signal protocol. In: EUROCRYPT (2019). https:\/\/doi.org\/10.1007\/978-3-030-17653-2_5","DOI":"10.1007\/978-3-030-17653-2_5"},{"key":"8_CR2","doi-asserted-by":"publisher","unstructured":"Arpin, S., Lau, J.B., Mesnard, A., Perlner, R., Robinson, A., Tillich, J.P., Vasseur, V.: Error floor prediction with markov models for qc-mdpc codes. In: Annual International Cryptology Conference, pp. 221\u2013252. Springer (2025). https:\/\/doi.org\/10.1007\/978-3-032-01855-7_8","DOI":"10.1007\/978-3-032-01855-7_8"},{"key":"8_CR3","doi-asserted-by":"publisher","unstructured":"Baldelli, A., Baldi, M., Chiaraluce, F., Santini, P.: Bf-max: an efficient bit flipping decoder with predictable decoding failure rate. In: Proceedings of the International Symposium on Information Theory (ISIT) (2025). https:\/\/doi.org\/10.1109\/isit63088.2025.11195380, https:\/\/arxiv.org\/abs\/2506.09689","DOI":"10.1109\/isit63088.2025.11195380"},{"key":"8_CR4","doi-asserted-by":"publisher","unstructured":"Berlekamp, E., McEliece, R., Van\u00a0Tilborg, H.: On the inherent intractability of certain coding problems (corresp.). IEEE Trans. Inform. theory 24(3), 384\u2013386 (2003). https:\/\/doi.org\/10.1109\/tit.1978.1055873","DOI":"10.1109\/tit.1978.1055873"},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"Blazy, O., Bossuat, A., Bultel, X., Fouque, P.A., Onete, C., Pagnin, E.: SAID: reshaping signal into an identity-based asynchronous messaging protocol with authenticated ratcheting. In: Proceedings of IEEE EuroS&P, pp. 294\u2013309 (2019). https:\/\/doi.org\/10.1109\/EuroSP.2019.00030","DOI":"10.1109\/EuroSP.2019.00030"},{"key":"8_CR6","unstructured":"Blazy, O., Boureanu, I., Lafourcade, P., Onete, C., Robert, L.: How fast do you heal? a taxonomy for post-compromise security in secure-channel establishment. In: Proceedings of USENIX (2023)"},{"key":"8_CR7","doi-asserted-by":"publisher","unstructured":"Boureanu, I., et al.: Post-compromise security with application-level key-controls \u2013 with a comprehensive study of the 5g akma protocol. In: Proceedings of AsiaCCS, pp. 231\u2013247 (2025). https:\/\/doi.org\/10.1145\/3708821.3733910","DOI":"10.1145\/3708821.3733910"},{"key":"8_CR8","doi-asserted-by":"publisher","unstructured":"Cohn-Gordon, K., Cremers, C., Dowling, B., Garratt, L., Stebila, D.: A formal security analysis of the signal messaging protocol. In: Proceedings of IEEE EuroS & P, pp. 451\u2013466 (July 2017). https:\/\/doi.org\/10.1109\/eurosp.2017.27","DOI":"10.1109\/eurosp.2017.27"},{"key":"8_CR9","doi-asserted-by":"publisher","unstructured":"Cohn-Gordon, K., Cremers, C.J.F., Garratt, L.: On post-compromise security. In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, 27 June 27 - 1 July 2016, pp. 164\u2013178 (2016). https:\/\/doi.org\/10.1109\/CSF.2016.19","DOI":"10.1109\/CSF.2016.19"},{"key":"8_CR10","unstructured":"Cremers, C., Hale, B., Kohbrok, K.: The complexities of healing in secure group messaging: why Cross-Group effects matter. In: Proceedings of USENIX (2021)"},{"key":"8_CR11","doi-asserted-by":"publisher","unstructured":"Cremers, C., Medinger, N., Naska, A.: Impossibility results for post-compromise security in real-world communication systems. In: Proceedings of IEEE S& P, pp. 4391\u20134405 (2025). https:\/\/doi.org\/10.1109\/sp61157.2025.00229","DOI":"10.1109\/sp61157.2025.00229"},{"key":"8_CR12","doi-asserted-by":"publisher","unstructured":"Deneuville, J.C., Gaborit, P., Z\u00e9mor, G.: Ouroboros: a simple, secure and efficient key exchange protocol based on coding theory. In: International Workshop on Post-Quantum Cryptography, pp. 18\u201334. Springer (2017). https:\/\/doi.org\/10.1007\/978-3-319-59879-6_2","DOI":"10.1007\/978-3-319-59879-6_2"},{"key":"8_CR13","doi-asserted-by":"publisher","unstructured":"Durak, F.B., Vaudenay, S.: Bidirectional asynchronous ratcheted key agreement with linear complexity. In: IWSEC (2019). https:\/\/doi.org\/10.1007\/978-3-030-26834-3_20","DOI":"10.1007\/978-3-030-26834-3_20"},{"key":"8_CR14","doi-asserted-by":"publisher","unstructured":"Jaeger, J., Stepanovs, I.: Optimal channel security against fine-grained state compromise: the safety of messaging. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10991. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96884-1_2","DOI":"10.1007\/978-3-319-96884-1_2"},{"key":"8_CR15","doi-asserted-by":"publisher","unstructured":"Jost, D., Maurer, U., Mularczyk, M.: Efficient ratcheting: almost-optimal guarantees for secure messaging. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11476. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17653-2_6","DOI":"10.1007\/978-3-030-17653-2_6"},{"key":"8_CR16","doi-asserted-by":"publisher","unstructured":"Juaneda, J., Dehez-Clementi, M., Deneuville, J.C., Lacan, J.: Rhqc: post-quantum ratcheted key exchange from coding assumptions. In: Proceedings of the International Symposium on Information Theory (ISIT) (2025). https:\/\/doi.org\/10.1109\/isit63088.2025.11195626, https:\/\/eprint.iacr.org\/2025\/481.pdf","DOI":"10.1109\/isit63088.2025.11195626"},{"issue":"4","key":"8_CR17","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-031-95963-9_33","volume":"2","author":"CA Melchor","year":"2018","unstructured":"Melchor, C.A., et al.: Hamming quasi-cyclic (hqc). NIST PQC Round 2(4), 13 (2018). https:\/\/doi.org\/10.1007\/978-3-031-95963-9_33","journal-title":"NIST PQC Round"},{"key":"8_CR18","unstructured":"Perrin, T., Marlinspike, M.: The double ratchet algorithm. GitHub wiki 112(4) (2016)"},{"key":"8_CR19","doi-asserted-by":"publisher","unstructured":"Poettering, B., R\u00f6sler, P.: Towards bidirectional ratcheted key exchange. In: hacham, H., Boldyreva, A. (eds) CRYPTO 2018. CRYPTO 2018. LNCS, vol. 10991. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96884-1_1","DOI":"10.1007\/978-3-319-96884-1_1"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-22698-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T10:23:32Z","timestamp":1775730212000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-22698-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032226976","9783032226983"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-22698-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"10 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PQCrypto","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Post-Quantum Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint-Malo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2026","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2026","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 April 2026","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pqcrypto2026","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}