Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems
From MaRDI portal
Publication:4928599
DOI10.1007/978-3-642-38616-9_15zbMath1306.94092OpenAlexW1479801926MaRDI QIDQ4928599
Publication date: 14 June 2013
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-38616-9_15
Related Items (6)
Toward secure implementation of McEliece decryption ⋮ Information-set decoding with hints ⋮ On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes ⋮ S-semantics -- an example ⋮ Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems ⋮ A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
This page was built for publication: Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems