Differential power analysis of a McEliece cryptosystem
From MaRDI portal
Publication:2794516
DOI10.1007/978-3-319-28166-7_26zbMATH Open1423.94061OpenAlexW2293546377MaRDI QIDQ2794516FDOQ2794516
Authors: Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
Publication date: 10 March 2016
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-28166-7_26
Recommendations
- Practical power analysis attacks on software implementations of McEliece
- Simple power analysis attack on the QC-LDPC McEliece cryptosystem
- Side Channels in the McEliece PKC
- Masking large keys in hardware: a masked implementation of McEliece
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
Cites Work
- The Magma algebra system. I: The user language
- Practical power analysis attacks on software implementations of McEliece
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Structural cryptanalysis of McEliece schemes with compact keys
- Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups
- Title not available (Why is that?)
- Algebraic cryptanalysis of McEliece variants with compact keys
- Fundamentals of Error-Correcting Codes
- Title not available (Why is that?)
- Title not available (Why is that?)
- Two Notes on Notation
- On the inherent intractability of certain coding problems (Corresp.)
- Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices
- Power Analysis Attacks
- Semantic security for the McEliece cryptosystem without random oracles
- Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices
- The Myth of Generic DPA…and the Magic of Learning
- Side Channels in the McEliece PKC
- A timing attack against the secret permutation in the McEliece PKC
Cited In (7)
- Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures
- Differential power analysis of the Picnic signature scheme
- Simple power analysis attack on the QC-LDPC McEliece cryptosystem
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
- Side Channels in the McEliece PKC
- Masking large keys in hardware: a masked implementation of McEliece
- Practical power analysis attacks on software implementations of McEliece
Uses Software
This page was built for publication: Differential power analysis of a McEliece cryptosystem
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2794516)