Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem
DOI10.1007/978-3-030-77886-6_15zbMATH Open1479.94141OpenAlexW3168480899MaRDI QIDQ2056746FDOQ2056746
Authors: Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Drăgoi, Alexandre Menu, Lilian Bossuet
Publication date: 8 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-77886-6_15
Recommendations
- Key-recovery fault injection attack on the classic McEliece KEM
- scientific article; zbMATH DE number 1088236
- A reaction attack on the QC-LDPC McEliece cryptosystem
- Attacking and Defending the McEliece Cryptosystem
- Punctured syndrome decoding problem. Efficient side-channel attacks against \textit{Classic McEliece}
- Effective attack on the McEliece cryptosystem based on Reed-Muller codes
- An efficient attack of a McEliece cryptosystem variant based on convolutional codes
- Key recovery attack on McNie based on low rank parity check codes and its reparation
- Key recovery under plaintext checking attack on LAC
- A key recovery attack on MDPC with CCA security using decoding errors
integer linear programmingcode-based cryptographysyndrome decoding problemclassic McEliecelaser fault injection
Linear programming (90C05) Cryptography (94A60) Integer programming (90C10) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes
- Title not available (Why is that?)
- A new polynomial-time algorithm for linear programming
- Title not available (Why is that?)
- A method for obtaining digital signatures and public-key cryptosystems
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding
- Decoding random linear codes in \(\tilde{\mathcal{O}}(2^{0.054n})\)
- Using Linear Programming to Decode Binary Linear Codes
- Title not available (Why is that?)
- A probabilistic algorithm for computing minimum weights of large error-correcting codes
- Title not available (Why is that?)
- New directions in cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Elliptic Curve Cryptosystems
- On the inherent intractability of certain coding problems (Corresp.)
- Title not available (Why is that?)
- Progress in Linear Programming-Based Algorithms for Integer Programming: An Exposition
- Bivium as a mixed-integer linear programming problem
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- On Finding Primal- and Dual-Optimal Bases
- Advanced Encryption Standard – AES
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
- On computing nearest neighbors with applications to decoding of binary linear codes
- Efficient Implementation of Linear Programming Decoding
- Mathematical Programming Decoding of Binary Linear Codes: Theory and Algorithms
- A Separation Algorithm for Improved LP-Decoding of Linear Block Codes
Cited In (11)
- SoK: how (not) to design and implement post-quantum cryptography
- A fault attack on the Niederreiter cryptosystem using binary irreducible Goppa codes
- A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack
- Punctured syndrome decoding problem. Efficient side-channel attacks against \textit{Classic McEliece}
- Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
- A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial
- Key-recovery fault injection attack on the classic McEliece KEM
- Integer syndrome decoding in the presence of noise
- Recovering Rainbow's secret key with a first-order fault attack
- Exploiting ROLLO's constant-time implementations with a single-trace analysis
Uses Software
This page was built for publication: Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2056746)