Why you should not put all your eggs in the same basket | Part 3
A series about post-quantum cryptography: Part III: Hybridization’s DIY Tutorial
Why you should not put all your eggs in the same basket | Part 2
A series about post-quantum cryptography: Part II: Hybridization
Why you should not put all your eggs in the same basket | Part 1
A serie about post-quantum cryptography: Part I: A Post-Quantum World
CRY.ME: Private key recovery with a single signature
During the inter-CESTI challenge organized by ANSSI, many vulnerabilities were included to test our abilities to find them and, if possible, to exploit them. In this article, we explore one vulnerability that we found during the original challenge, and explainhow we exploited it: can we find a secret key from a singlesignature?