{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:38:51Z","timestamp":1776926331805,"version":"3.51.2"},"reference-count":27,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065296","type":"journal-article","created":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T04:05:43Z","timestamp":1750392343000},"page":"4583-4599","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["An Optimization of Weak Key Attacks Based on the BGF Decoding Algorithm"],"prefix":"10.32604","volume":"84","author":[{"given":"Bing","family":"Liu","sequence":"first","affiliation":[]},{"given":"Ting","family":"Nie","sequence":"additional","affiliation":[]},{"given":"Yansong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Weibo","family":"Hu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"8744","DOI":"10.3390\/s23218744","article-title":"Post-quantum security: opportunities and challenges","volume":"23","author":"Li","year":"2023","journal-title":"Sensors"},{"key":"ref2","series-title":"Proceedings 35th Annual Symposium on Foundations of Computer Science","first-page":"124","article-title":"Algorithms for quantum computation: discrete logarithms and factoring","author":"Shor"},{"key":"ref3","author":"Alagic","year":"2022","journal-title":"Status report on the third round of the NIST post-quantum cryptography standardization process"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MSP.2017.3151345","article-title":"Code-based cryptography: state of the art and perspectives","volume":"15","author":"Sendrier","year":"2017","journal-title":"IEEE Secur Priv"},{"key":"ref5","series-title":"International Conference on Post-Quantum Cryptography","first-page":"35","article-title":"QC-MDPC decoders with several shades of gray","author":"Drucker"},{"key":"ref6","unstructured":"Aragon N, Barreto P, Bettaieb S, Bidoux L, Blazy O, Deneuville JC, et al. BIKE: bit flipping key encapsulation; 2022 [cited 2025 Apr 15]. Available from: https:\/\/bikesuite.org\/files\/v4.2\/BIKE_Spec.2021.09.29.1.pdf."},{"key":"ref7","series-title":"Advances in Cryptology\u2013ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security; 2016 Dec 4\u20138; Hanoi, Vietnam","first-page":"789","article-title":"A key recovery attack on MDPC with CCA security using decoding errors","author":"Guo"},{"key":"ref8","series-title":"Annual International Cryptology Conference","first-page":"70","article-title":"Exploring decryption failures of BIKE: new class of weak keys and key recovery attacks","author":"Wang"},{"key":"ref9","series-title":"International Conference on Post-Quantum Cryptography","first-page":"47","article-title":"QC-MDPC: a timing attack and a CCA2 KEM","author":"Eaton"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1845","DOI":"10.1109\/TIT.2018.2877458","article-title":"A key recovery reaction attack on QC-MDPC","volume":"65","author":"Guo","year":"2018","journal-title":"IEEE Trans Inf Theory"},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"Nilsson A, Johansson T, Wagner PS. Error amplification in code-based cryptography. Cryptology ePrint Archive; 2018. doi:10.13154\/tches.v2019.i1.238-258.","DOI":"10.46586\/tches.v2019.i1.238-258"},{"key":"ref12","unstructured":"Drucker N, Gueron S, Kostic D. On constant-time QC-MDPC decoding with negligible failure rate. Cryptology ePrint Archive; 2019 [cited 2025 Apr 15]. Available from: https:\/\/eprint.iacr.org\/2017\/604."},{"key":"ref13","first-page":"157","article-title":"Knapsack-type cryptosystems and algebraic coding theory","volume":"15","author":"Niederreiter","year":"1986","journal-title":"Prob Control Inform Theory"},{"key":"ref14","series-title":"Annual International Cryptology Conference","first-page":"537","article-title":"Secure integration of asymmetric and symmetric encryption schemes","author":"Fujisaki"},{"key":"ref15","series-title":"IMA International Conference on Cryptography and Coding","first-page":"133","article-title":"A designer\u2019s guide to KEMs","author":"Dent","year":"2003"},{"key":"ref16","series-title":"Theory of Cryptography Conference","first-page":"341","article-title":"A modular analysis of the Fujisaki-Okamoto transformation","author":"Hofheinz"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TIT.1962.1057683","article-title":"Low-density parity-check codes","volume":"8","author":"Gallager","year":"1962","journal-title":"IRE Trans Inf Theory"},{"key":"ref18","unstructured":"Vasseur V. QC-MDPC codes DFR and the IND-CCA security of bike; 2022 [cited 2025 Apr 15]. Available from: https:\/\/ia.cr\/2021\/1458."},{"key":"ref19","doi-asserted-by":"crossref","unstructured":"Sendrier N, Vasseur V. On the decoding failure rate of QC-MDPC bit-flipping decoders. In: Ding J, Steinwandt R, editors. Post-quantum cryptography. Cham: Springer; 2019. Vol. 11505. p. 404\u201316.","DOI":"10.1007\/978-3-030-25510-7_22"},{"key":"ref20","series-title":"International Conference on Post-Quantum Cryptography","first-page":"20","article-title":"About low DFR for QC-MDPC decoding","author":"Sendrier"},{"key":"ref21","author":"Vasseur","year":"2021","journal-title":"Post-quantum cryptography: a study of the decoding of QC-MDPC codes"},{"key":"ref22","series-title":"International Conference on Information Security and Cryptology","first-page":"341","article-title":"A closer look at the Guo-Johansson\u2013Stankovski attack against QC-MDPC codes","author":"Chou"},{"key":"ref23","doi-asserted-by":"crossref","unstructured":"Sendrier N, Vasseur V. On the existence of weak keys for QC-MDPC decoding; 2020 [cited 2025 Apr 15]. Available from: https:\/\/ia.cr\/2020\/1232.","DOI":"10.1007\/978-3-030-44223-1_2"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"2160","DOI":"10.1109\/TIFS.2023.3264153","article-title":"Weak-key analysis for bike post-quantum key encapsulation mechanism","volume":"18","author":"Nosouhi","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref25","unstructured":"Sendrier N. Secure sampling of constant-weight words\u2013application to bike. Cryptology ePrint Archive; 2021 [cited 2025 Apr 15]. Available from: https:\/\/ia.cr\/2021\/1631."},{"key":"ref26","series-title":"International Conference on Post-Quantum Cryptography","first-page":"89","article-title":"A study of error floor behavior in QC-MDPC codes","author":"Arpin"},{"key":"ref27","series-title":"Progress in Cryptology\u2013AFRICACRYPT 2016: 8th International Conference on Cryptology in Africa; 2016 Apr 13\u201315; Fes, Morocco","first-page":"346","article-title":"Weak keys for the quasi-cyclic MDPC public key encryption scheme","author":"Bardet"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_65296\/TSP_CMC_65296.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:23Z","timestamp":1776923123000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63156"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":27,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065296","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-03-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-23","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}