{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:21:40Z","timestamp":1740172900963,"version":"3.37.3"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T00:00:00Z","timestamp":1718236800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T00:00:00Z","timestamp":1718236800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-024-00527-z","type":"journal-article","created":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T18:05:22Z","timestamp":1718301922000},"page":"497-511","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design criteria of a new code-based KEM"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-4722-9126","authenticated-orcid":false,"given":"Victoria","family":"Vysotskaya","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9126-6442","authenticated-orcid":false,"given":"Ivan","family":"Chizhov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,13]]},"reference":[{"issue":"5","key":"527_CR1","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/s0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997). https:\/\/doi.org\/10.1137\/s0097539795293172","journal-title":"SIAM J. Comput."},{"issue":"3","key":"527_CR2","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TIT.1978.1055873","volume":"24","author":"ER Berlekamp","year":"1978","unstructured":"Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.A.: On the inherent intractability of certain coding problems. IEEE Trans. Inf. Theory 24(3), 384\u2013386 (1978). https:\/\/doi.org\/10.1109\/TIT.1978.1055873","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"527_CR3","doi-asserted-by":"publisher","first-page":"23","DOI":"10.18287\/0134-2452-2015-39-4-459-461.","volume":"30","author":"S Barg","year":"1994","unstructured":"Barg, S.: Some new NP-complete coding problems. Probl. Peredachi Inf. 30(3), 23\u201328 (1994). https:\/\/doi.org\/10.18287\/0134-2452-2015-39-4-459-461.","journal-title":"Probl. Peredachi Inf."},{"key":"527_CR4","doi-asserted-by":"publisher","unstructured":"Both, L., May, A.: Decoding linear codes with high error rate and its impact for LPN security. In: Post-Quantum Cryptography. PQCrypto 2018. LNCS, vol. 10786, pp. 25\u201346 (2018). https:\/\/doi.org\/10.1007\/978-3-319-79063-3_2","DOI":"10.1007\/978-3-319-79063-3_2"},{"key":"527_CR5","doi-asserted-by":"publisher","unstructured":"Hofheinz, D., Hovelmanns, K., Kiltz, E.: A modular analysis of the Fujisaki-Okamoto transformation. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). LNCS, vol. 10677, pp. 341\u2013371 (2017). https:\/\/doi.org\/10.1007\/978-3-319-70500-2_12","DOI":"10.1007\/978-3-319-70500-2_12"},{"key":"527_CR6","unstructured":"Bernstein, D.J., Chou, T., Cid, C., Gilcher, J., Lange, T., Maram, V., von Maurich, I., Misoczki, R., Niederhagen, R., Persichetti, E., Peters, C., Sendrier, N., Szefer, J., Tjhai, C.J., Tomlinson, M., Wang, W.: Classic McEliece: conservative code-based cryptography: cryptosystem specification. NIST proposal, (October), (2022)"},{"key":"527_CR7","unstructured":"Albrecht, M., Cid, K., Paterson, K.G., Tjhai, C.J., Tomlinson, M.: NTS-KEM. Technical report (2017)"},{"key":"527_CR8","unstructured":"Gligoroski, D.: Post-quantum Key Encapsulation Mechanism EDON-K. NIST proposal, pp. 1\u201342 (2017)"},{"key":"527_CR9","unstructured":"Bardet, M., Barelli, E., Blazy, O., Torres, RC., Couvreur, A., Gaborit, P., Otmani, A., Sendrier, N., Tillich, J.P.: BIG QUAKE: BInary Goppa QUAsi-cyclic Key Encapsulation. Technical report (2017). https:\/\/bigquake.inria.fr\/"},{"issue":"10","key":"527_CR10","doi-asserted-by":"publisher","first-page":"6830","DOI":"10.1109\/TIT.2013.2272036","volume":"59","author":"JC Faugere","year":"2013","unstructured":"Faugere, J.C., Gauthier-Umana, V., Otmani, A., Perret, L., Tillich, J.P.: A distinguisher for high-rate McEliece cryptosystems. IEEE Trans. Inf. Theory 59(10), 6830\u20136844 (2013). https:\/\/doi.org\/10.1109\/TIT.2013.2272036","journal-title":"IEEE Trans. Inf. Theory"},{"key":"527_CR11","doi-asserted-by":"publisher","unstructured":"Strenzke, F., Erik T.H., Molter, G., Overbeck, R., Shoufan, A.: Side channels in the McEliece PKC. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5299 LNCS (May 2014), pp. 216\u2013229 (2008). https:\/\/doi.org\/10.1007\/978-3-540-88403-3_15","DOI":"10.1007\/978-3-540-88403-3_15"},{"key":"527_CR12","doi-asserted-by":"publisher","unstructured":"Shoufan, A., Strenzke, F., Molter, G.H., St\u00f6ttinger, M.: A timing attack against Patterson algorithm in the McEliece PKC. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5984 LNCS, pp. 161\u2013175 (2010). https:\/\/doi.org\/10.1007\/978-3-642-14423-3_12","DOI":"10.1007\/978-3-642-14423-3_12"},{"key":"527_CR13","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s13389-011-0024-9","volume":"1","author":"RM Avanzi","year":"2011","unstructured":"Avanzi, R.M., Hoerder, S., Page, D., Tunstall, M.: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems. J. Cryptogr. Eng. 1, 271\u2013281 (2011)","journal-title":"J. Cryptogr. Eng."},{"key":"527_CR14","doi-asserted-by":"publisher","unstructured":"Strenzke, F.: A timing attack against the secret permutation in the McEliece PKC. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6061 LNCS, pp. 95\u2013107 (2010). https:\/\/doi.org\/10.1007\/978-3-642-12929-2_8","DOI":"10.1007\/978-3-642-12929-2_8"},{"issue":"1","key":"527_CR15","doi-asserted-by":"publisher","first-page":"7","DOI":"10.15837\/ijccc.2017.1.2780","volume":"12","author":"D Bucerzan","year":"2017","unstructured":"Bucerzan, D., Cayrel, P.L., Dragoi, V.: Improved timing attacks against the secret permutation in the mceliece PKC. Int. J. Comput. Commun. Control 12(1), 7\u201325 (2017). https:\/\/doi.org\/10.15837\/ijccc.2017.1.2780","journal-title":"Int. J. Comput. Commun. Control"},{"issue":"1","key":"527_CR16","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s13389-011-0001-3","volume":"1","author":"HG Molter","year":"2011","unstructured":"Molter, H.G., Stottinger, M., Shoufan, A., Strenzke, F.: A simple power analysis attack on a McEliece cryptoprocessor. J. Cryptogr. Eng. 1(1), 29\u201336 (2011). https:\/\/doi.org\/10.1007\/s13389-011-0001-3","journal-title":"J. Cryptogr. Eng."},{"key":"527_CR17","doi-asserted-by":"crossref","unstructured":"Colombier, B., Dragoi, V.-F., Cayrel, P.-L., Grosso, V.: Profiled side-channel attack on cryptosystems based on the binary syndrome decoding problem. IACR Cryptology ePrint Archive, pp. 1\u201314 (2022)","DOI":"10.1109\/TIFS.2022.3198277"},{"key":"527_CR18","doi-asserted-by":"publisher","unstructured":"Cayrel, P.L., Colombier, B., Dragoi, V.F., Menu, A., Bossuet, L.: Message-recovery laser fault injection attack on the classic McEliece cryptosystem. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12697 LNCS, pp. 438\u2013467 (2021). https:\/\/doi.org\/10.1007\/978-3-030-77886-6_15","DOI":"10.1007\/978-3-030-77886-6_15"},{"key":"527_CR19","doi-asserted-by":"publisher","unstructured":"Lahr, N., Niederhagen, R., Petri, R., Samardjiska, S.: Side channel information set decoding using iterative chunking. In: Advances in Cryptology\u2014ASIACRYPT,: ASIACRYPT 2020. Lecture Notes in Computer Science 12491, pp. 881\u2013910 (2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_29","DOI":"10.1007\/978-3-030-64837-4_29"},{"key":"527_CR20","doi-asserted-by":"crossref","unstructured":"Banegas, G., Barreto, P.S.L.M., Boidje, B.O., Cayrel, P.L., Dione, G.N., Gaj, K., Gueye, C.T., Haeussler, R., Klamti, J.B., N\u2019diaye, O., Nguyen, D.T., Persichetti, E., Ricardini, J.E.: DAGS: key encapsulation using dyadic GS codes. Technical report, (2017)","DOI":"10.1515\/jmc-2018-0027"},{"issue":"2","key":"527_CR21","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1515\/jmc-2011-0099","volume":"6","author":"E Persichetti","year":"2012","unstructured":"Persichetti, E.: Compact McEliece keys based on quasi-dyadic Srivastava codes. J. Math. Cryptol. 6(2), 149\u2013169 (2012). https:\/\/doi.org\/10.1515\/jmc-2011-0099","journal-title":"J. Math. Cryptol."},{"key":"527_CR22","unstructured":"Wang, Y.: RLCE Key Encapsulation Mechanism (RLCE-KEM) Specification. NIST proposal, pp. 1\u201364 (2017)"},{"key":"527_CR23","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-030-25510-7_8","volume":"11505","author":"A Couvreur","year":"2019","unstructured":"Couvreur, A., Lequesne, M., Tillich, J.P.: Recovering short secret keys of RLCE in polynomial time. Lect. Notes Comput. Sci. 11505, 133\u2013152 (2019). https:\/\/doi.org\/10.1007\/978-3-030-25510-7_8","journal-title":"Lect. Notes Comput. Sci."},{"key":"527_CR24","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-319-17296-5_13","volume":"3","author":"A Couvreur","year":"2015","unstructured":"Couvreur, A., M\u00e1rquez-Corbella, I., Pellikaan, R.: Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes. Coding Theory Appl. CIM Ser. Math. Sci. 3, 133\u2013140 (2015). https:\/\/doi.org\/10.1007\/978-3-319-17296-5_13","journal-title":"Coding Theory Appl. CIM Ser. Math. Sci."},{"issue":"4","key":"527_CR25","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1515\/dma.1992.2.4.439","volume":"2","author":"VM Sidelnikov","year":"1992","unstructured":"Sidelnikov, V.M., Shestakov, S.O.: On insecurity of cryptosystems based on generalized Reed\u2013Solomon codes. Discrete Math. Appl. 2(4), 439\u2013444 (1992). https:\/\/doi.org\/10.1515\/dma.1992.2.4.439","journal-title":"Discrete Math. Appl."},{"issue":"2","key":"527_CR26","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1007\/s10623-014-9967-z","volume":"73","author":"A Couvreur","year":"2014","unstructured":"Couvreur, A., Gaborit, P., Gauthier-Uma\u00f1a, V., Otmani, A., Tillich, J.-P.: Distinguisher-based attacks on public-key cryptosystems using Reed\u2013Solomon codes. Des. Codes Cryptogr. 73(2), 641\u2013666 (2014). arXiv:1307.6458","journal-title":"Des. Codes Cryptogr."},{"key":"527_CR27","unstructured":"Melchor, C.A., Gaborit, N., , Limoges, P., Bettaieb, J., Persichetti, E., Bidoux, L., Robert, J.-M., Blazy, O., V\u00e9ron, P., Bos, J., Z\u00e9mor, G., Deneuville, J.-C.: Hamming Quasi-Cyclic (HQC). Technical report, (2019)"},{"key":"527_CR28","unstructured":"Melchor, C.A., Aragon, N., Bettaieb, S., Bidoux, L., Blazy, O., Deneuville, J.C., Gaborit, P., Z\u00e9mor, G.: Rank Quasi-Cyclic (RQC). Technical report, (2017)"},{"key":"527_CR29","unstructured":"Aragon, N., Barreto, P., Bettaieb, S., Bidoux, L., Blazy, O., Deneuville, J., Gaborit, P., Gueron, S., Guneysu, T., Melchor, C.A., Misoczki, R., Persichetti, E., Sendrier, N., Tillich, J.-P., Vasseur, V., Z\u00e9mor, G.: Bike: Bit Flipping Key Encapsulation\u2014Round 3 Submission. Technical report, (2021)"},{"key":"527_CR30","unstructured":"Eaton, E., Parent, A.: QC-MDPC KEM: a key encapsulation mechanism based on the QC-MDPC McEliece encryption scheme. Technical report, (2017)"},{"key":"527_CR31","doi-asserted-by":"crossref","unstructured":"Baldi, M., Chiaraluce, F., Pelosi, G., Santini, P.: LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes. NIST proposal, pp. 1\u201322 (2017)","DOI":"10.1007\/978-3-319-79063-3_1"},{"key":"527_CR32","unstructured":"Yu, Y., Zhang, J.: Lepton: key encapsulation mechanisms from a variant of learning parity with noise. Technical report, (2017)"},{"key":"527_CR33","doi-asserted-by":"publisher","unstructured":"Eaton, E., Lequesne, M., Parent, A., Sendrier, N.: QC-MDPC: a timing attack and a CCA2 KEM. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10786 LNCS (645622), pp. 47\u201376 (2018). https:\/\/doi.org\/10.1007\/978-3-319-79063-3_3","DOI":"10.1007\/978-3-319-79063-3_3"},{"key":"527_CR34","doi-asserted-by":"publisher","unstructured":"Von Maurich, I., Guneysu, T.: Towards side-channel resistant implementations of QC-MDPC McEliece encryption on constrained devices. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 8772, pp. 266\u2013282 (2014). https:\/\/doi.org\/10.1007\/978-3-319-11659-4_16","DOI":"10.1007\/978-3-319-11659-4_16"},{"key":"527_CR35","doi-asserted-by":"publisher","unstructured":"Paiva, T.B.,Terada, R.: A timing attack on the HQC encryption scheme. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11959 LNCS (442014), pp. 551\u2013573 (2020). https:\/\/doi.org\/10.1007\/978-3-030-38471-5_22","DOI":"10.1007\/978-3-030-38471-5_22"},{"issue":"3","key":"527_CR36","doi-asserted-by":"publisher","first-page":"621","DOI":"10.3934\/amc.2020126","volume":"16","author":"G Wafo-Tapa","year":"2022","unstructured":"Wafo-Tapa, G., Bettaieb, S., Bidoux, L., Gaborit, P., Marcatel, E.: A practicable timing attack against HQC and its countermeasure. Adv. Math. Commun. 16(3), 621\u2013642 (2022). https:\/\/doi.org\/10.3934\/amc.2020126","journal-title":"Adv. Math. Commun."},{"issue":"3","key":"527_CR37","doi-asserted-by":"publisher","first-page":"223","DOI":"10.46586\/tches.v2022.i3.223-263","volume":"2022","author":"Q Guo","year":"2022","unstructured":"Guo, Q., Hlauschek, C., Johansson, T., Lahr, N., Nilsson, A., Schr\u00f6der, R.L.: Don\u2019t reject this: key-recovery timing attacks due to rejection-sampling in HQC and BIKE. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3), 223\u2013263 (2022). https:\/\/doi.org\/10.46586\/tches.v2022.i3.223-263","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"527_CR38","doi-asserted-by":"publisher","unstructured":"Chen, C., Eisenbarth, T., Von Maurich, I., Steinwandt, R.: Differential power analysis of a McEliece cryptosystem. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 9092, pp. 538\u2013556 (2015). https:\/\/doi.org\/10.1007\/978-3-319-28166-7_26","DOI":"10.1007\/978-3-319-28166-7_26"},{"issue":"6","key":"527_CR39","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.1109\/TIFS.2015.2509944","volume":"11","author":"C Chen","year":"2016","unstructured":"Chen, C., Eisenbarth, T., Von Maurich, I., Steinwandt, R.: Horizontal and vertical side channel analysis of a McEliece cryptosystem. IEEE Trans. Inf. Forensics Secur. 11(6), 1093\u20131105 (2016). https:\/\/doi.org\/10.1109\/TIFS.2015.2509944","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"527_CR40","doi-asserted-by":"crossref","unstructured":"Rossi, M., Hamburg, M., Hutter, M., Marson, M.E: A side-channel assisted cryptanalytic attack against QcBits. In: Cryptographic Hardware and Embedded Systems-CHES 2017-19th International Conference, pp. 3\u201323 (2017)","DOI":"10.1007\/978-3-319-66787-4_1"},{"issue":"4","key":"527_CR41","doi-asserted-by":"publisher","first-page":"180","DOI":"10.13154\/tches.v2019.i4.180-212","volume":"2019","author":"BY Sim","year":"2019","unstructured":"Sim, B.Y., Kwon, J., Choi, K.Y., Cho, J., Park, A., Han, D.G.: Novel side-channel attacks on quasi-cyclic code-based cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(4), 180\u2013212 (2019). https:\/\/doi.org\/10.13154\/tches.v2019.i4.180-212","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"527_CR42","doi-asserted-by":"publisher","unstructured":"Schamberger, T., Renner, J., Sigl, G., Wachter-Zeh, A.: A power side-channel attack on the CCA2-Secure HQC KEM. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12609 LNCS, pp. 119\u2013134 (2021). https:\/\/doi.org\/10.1007\/978-3-030-68487-7_8","DOI":"10.1007\/978-3-030-68487-7_8"},{"issue":"1","key":"527_CR43","doi-asserted-by":"publisher","first-page":"296","DOI":"10.46586\/tches.v2022.i1.296-322","volume":"2022","author":"R Ueno","year":"2021","unstructured":"Ueno, R., Xagawa, K., Tanaka, Y., Ito, A., Takahashi, J., Homma, N.: Curse of re-encryption: a generic power\/EM analysis on post-quantum KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1), 296\u2013322 (2021). https:\/\/doi.org\/10.46586\/tches.v2022.i1.296-322","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"527_CR44","doi-asserted-by":"publisher","unstructured":"Guo, Q., Johansson, T., Stankovski, P.: A key recovery attack on MDPC with CCA security using decoding errors. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10031 LNCS, pp. 789\u2013815 (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_29","DOI":"10.1007\/978-3-662-53887-6_29"},{"key":"527_CR45","unstructured":"Fabsic, T., Hromada, V., Zajac, P.: A reaction attack on LEDApkc. IACR Cryptology ePrint Archive, pp. 1\u201312 (2018)"},{"key":"527_CR46","doi-asserted-by":"publisher","unstructured":"Santini, P., Battaglioni, M., Chiaraluce, F., Baldi, M.: Analysis of reaction and timing attacks against cryptosystems based on sparse parity-check codes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11666 LNCS, pp. 115\u2013136 (2019). https:\/\/doi.org\/10.1007\/978-3-030-25922-8_7","DOI":"10.1007\/978-3-030-25922-8_7"},{"key":"527_CR47","doi-asserted-by":"publisher","unstructured":"Sendrier, N.: Decoding one out of many. A World of Difference, pp. 257\u2013294 (2008). https:\/\/doi.org\/10.1007\/978-1-137-11037-4_15","DOI":"10.1007\/978-1-137-11037-4_15"},{"issue":"44","key":"527_CR48","first-page":"114","volume":"42","author":"RJ McEliece","year":"1978","unstructured":"McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Deep Space Netw. Prog. Rep. 42(44), 114\u2013116 (1978)","journal-title":"Deep Space Netw. Prog. Rep."},{"issue":"2","key":"527_CR49","first-page":"159","volume":"15","author":"H Niederreiter","year":"1986","unstructured":"Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Probl. Control Inf. Theory 15(2), 159\u2013166 (1986)","journal-title":"Probl. Control Inf. Theory"},{"key":"527_CR50","unstructured":"Aragon, N., Hauteville, A., Blazy, O., Ruatta, O., Deneuville, J.-C., Gaborit, P., Z\u00e9mor, G., Gaborit, P., Hauteville, A.: LOCKER\u2013 LOw rank parity ChecK codes EncRyption. Technical report (2017)"},{"issue":"20","key":"527_CR51","doi-asserted-by":"publisher","first-page":"1720","DOI":"10.1049\/el:19991190","volume":"35","author":"M Elia","year":"1999","unstructured":"Elia, M., Viterbo, E., Bertinetti, G.: Decoding of binary separable Goppa codes using Berlekamp\u2013Massey algorithm. Electron. Lett. 35(20), 1720\u20131721 (1999)","journal-title":"Electron. Lett."},{"key":"527_CR52","doi-asserted-by":"publisher","unstructured":"Bellare, M., Rogaway, P.: Optimal asymmetric encryption. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics 950), pp. 92\u2013111 (1995). https:\/\/doi.org\/10.1007\/bfb0053428","DOI":"10.1007\/bfb0053428"},{"key":"527_CR53","doi-asserted-by":"publisher","unstructured":"Fujisaki, E., Okamoto, T.: How to enhance the security of public-key encryption at minimum cost. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1560, pp. 53\u201368 (1999). https:\/\/doi.org\/10.1007\/3-540-49162-7_5","DOI":"10.1007\/3-540-49162-7_5"},{"key":"527_CR54","doi-asserted-by":"publisher","unstructured":"Pointcheval, D.: Chosen-ciphertext security for any one-way cryptosystem. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1751, pp. 129\u2013146 (2000). https:\/\/doi.org\/10.1007\/978-3-540-46588-1_10","DOI":"10.1007\/978-3-540-46588-1_10"},{"key":"527_CR55","doi-asserted-by":"publisher","unstructured":"Kobara, K., Imai, H.: Semantically secure mceliece public-key cryptosystems\u2014conversions for McEliece PKC-. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1992, pp. 19\u201335 (2001). https:\/\/doi.org\/10.1007\/3-540-44586-2_2","DOI":"10.1007\/3-540-44586-2_2"},{"key":"527_CR56","doi-asserted-by":"crossref","unstructured":"Fujusaki, E., Okamoto, T.: Secure inregration of asymmetric and symmetric encryption schemes. LNCS.CRYPTO\u201999, pp. 537\u2013554 (1999)","DOI":"10.1007\/3-540-48405-1_34"},{"key":"527_CR57","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/s00145-011-9114-1","volume":"26","author":"E Fujisaki","year":"2013","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. J. Cryptol. 26, 80\u2013101 (2013). https:\/\/doi.org\/10.1007\/s00145-011-9114-1","journal-title":"J. Cryptol."},{"key":"527_CR58","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-540-40974-8_12","volume":"2898","author":"AW Dent","year":"2003","unstructured":"Dent, A.W.: A designer\u2019s guide to KEMs. Lect. Notes Comput. Sci. 2898, 133\u2013151 (2003)","journal-title":"Lect. Notes Comput. Sci."},{"key":"527_CR59","unstructured":"Bernstein, D.J., Persichetti, E.: Towards KEM unification. IACR Cryptology ePrint Archive, pp. 1\u201337 (2018)"},{"key":"527_CR60","doi-asserted-by":"publisher","unstructured":"Jiang, H., Zhang, Z., Chen, L., Wang, H., Ma, Z.: IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10993 LNCS, Tcc, 2017, pp. 96\u2013125, 2018. https:\/\/doi.org\/10.1007\/978-3-319-96878-0_4","DOI":"10.1007\/978-3-319-96878-0_4"},{"key":"527_CR61","doi-asserted-by":"publisher","unstructured":"Saito, T., Xagawa, K., Yamakawa, T.: Tightly-secure key-encapsulation mechanism in the quantum random oracle model. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10822 LNCS, pp. 520\u2013551 (2018). https:\/\/doi.org\/10.1007\/978-3-319-78372-7_17","DOI":"10.1007\/978-3-319-78372-7_17"},{"key":"527_CR62","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-030-25510-7_13","volume":"11505","author":"H Jiang","year":"2019","unstructured":"Jiang, H., Zhang, Z., Ma, Z.: Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model. LNCS 11505, 227\u2013248 (2019). https:\/\/doi.org\/10.1007\/978-3-030-25510-7_13","journal-title":"LNCS"},{"key":"527_CR63","first-page":"61","volume":"11892","author":"N Bindel","year":"2019","unstructured":"Bindel, N., Hamburg, M., H\u00f6velmanns, K., H\u00fclsing, A., Persichetti, E.: Tighter proofs of CCA security in the quantum random oracle model. LNCS 11892, 61\u201390 (2019)","journal-title":"LNCS"},{"issue":"4","key":"527_CR64","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1515\/jmc-2018-0027","volume":"12","author":"G Banegas","year":"2018","unstructured":"Banegas, G., Barreto, P.S.L.M., Boidje, B.O., Cayrel, P.L., Dione, G.N., Gaj, K., Gueye, C.T., Haeussler, R., Klamti, J.B., N\u2019diaye, O., Nguyen, D.T., Persichetti, E., Ricardini, J.E.: DAGS: Key encapsulation using dyadic GS codes. J. Math. Cryptol. 12(4), 221\u2013239 (2018). https:\/\/doi.org\/10.1515\/jmc-2018-0027","journal-title":"J. Math. Cryptol."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00527-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-024-00527-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00527-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T10:10:08Z","timestamp":1736417408000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-024-00527-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,13]]},"references-count":64,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["527"],"URL":"https:\/\/doi.org\/10.1007\/s11416-024-00527-z","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2024,6,13]]},"assertion":[{"value":"15 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no Conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}