Differential Power Analysis of a McEliece Cryptosystem
From MaRDI portal
Publication:2794516
DOI10.1007/978-3-319-28166-7_26zbMath1423.94061OpenAlexW2293546377MaRDI QIDQ2794516
Cong Chen, Rainer Steinwandt, Thomas Eisenbarth, Ingo von Maurich
Publication date: 10 March 2016
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-28166-7_26
Related Items
Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures, Masking Large Keys in Hardware: A Masked Implementation of McEliece
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Structural cryptanalysis of McEliece schemes with compact keys
- Semantic security for the McEliece cryptosystem without random oracles
- The Magma algebra system. I: The user language
- Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
- Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices
- Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups
- Two Notes on Notation
- Side Channels in the McEliece PKC
- Algebraic Cryptanalysis of McEliece Variants with Compact Keys
- Fundamentals of Error-Correcting Codes
- A Timing Attack against the Secret Permutation in the McEliece PKC
- Practical Power Analysis Attacks on Software Implementations of McEliece
- On the inherent intractability of certain coding problems (Corresp.)
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Power Analysis Attacks
- The Myth of Generic DPA…and the Magic of Learning