Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem
From MaRDI portal
Publication:2056746
Recommendations
- Key-recovery fault injection attack on the classic McEliece KEM
- scientific article; zbMATH DE number 1088236
- A reaction attack on the QC-LDPC McEliece cryptosystem
- Attacking and Defending the McEliece Cryptosystem
- Punctured syndrome decoding problem. Efficient side-channel attacks against \textit{Classic McEliece}
- Effective attack on the McEliece cryptosystem based on Reed-Muller codes
- An efficient attack of a McEliece cryptosystem variant based on convolutional codes
- Key recovery attack on McNie based on low rank parity check codes and its reparation
- Key recovery under plaintext checking attack on LAC
- A key recovery attack on MDPC with CCA security using decoding errors
Cites work
- scientific article; zbMATH DE number 3948147 (Why is no real title available?)
- scientific article; zbMATH DE number 3989251 (Why is no real title available?)
- scientific article; zbMATH DE number 4070796 (Why is no real title available?)
- scientific article; zbMATH DE number 4112524 (Why is no real title available?)
- scientific article; zbMATH DE number 3466805 (Why is no real title available?)
- scientific article; zbMATH DE number 3577144 (Why is no real title available?)
- scientific article; zbMATH DE number 1489799 (Why is no real title available?)
- scientific article; zbMATH DE number 3069632 (Why is no real title available?)
- A Separation Algorithm for Improved LP-Decoding of Linear Block Codes
- A method for obtaining digital signatures and public-key cryptosystems
- A new polynomial-time algorithm for linear programming
- A probabilistic algorithm for computing minimum weights of large error-correcting codes
- Advanced Encryption Standard – AES
- Bivium as a mixed-integer linear programming problem
- Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding
- Decoding random linear codes in \(\tilde{\mathcal{O}}(2^{0.054n})\)
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- Efficient Implementation of Linear Programming Decoding
- Elliptic Curve Cryptosystems
- LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes
- Mathematical Programming Decoding of Binary Linear Codes: Theory and Algorithms
- New directions in cryptography
- On Finding Primal- and Dual-Optimal Bases
- On computing nearest neighbors with applications to decoding of binary linear codes
- On the inherent intractability of certain coding problems (Corresp.)
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Progress in Linear Programming-Based Algorithms for Integer Programming: An Exposition
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
- Using Linear Programming to Decode Binary Linear Codes
Cited in
(11)- SoK: how (not) to design and implement post-quantum cryptography
- Exploiting ROLLO's constant-time implementations with a single-trace analysis
- A fault attack on the Niederreiter cryptosystem using binary irreducible Goppa codes
- A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack
- Punctured syndrome decoding problem. Efficient side-channel attacks against \textit{Classic McEliece}
- Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
- A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial
- Key-recovery fault injection attack on the classic McEliece KEM
- Integer syndrome decoding in the presence of noise
- Recovering Rainbow's secret key with a first-order fault attack
This page was built for publication: Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2056746)