Differential power analysis of a McEliece cryptosystem
From MaRDI portal
Publication:2794516
Recommendations
- Practical power analysis attacks on software implementations of McEliece
- Simple power analysis attack on the QC-LDPC McEliece cryptosystem
- Side Channels in the McEliece PKC
- Masking large keys in hardware: a masked implementation of McEliece
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
Cites work
- scientific article; zbMATH DE number 1618037 (Why is no real title available?)
- scientific article; zbMATH DE number 3174791 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A timing attack against the secret permutation in the McEliece PKC
- Algebraic cryptanalysis of McEliece variants with compact keys
- Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups
- Fundamentals of Error-Correcting Codes
- On the inherent intractability of certain coding problems (Corresp.)
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Power Analysis Attacks
- Practical power analysis attacks on software implementations of McEliece
- Semantic security for the McEliece cryptosystem without random oracles
- Side Channels in the McEliece PKC
- Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices
- Structural cryptanalysis of McEliece schemes with compact keys
- The Magma algebra system. I: The user language
- The Myth of Generic DPA…and the Magic of Learning
- Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices
- Two Notes on Notation
Cited in
(7)- Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures
- Differential power analysis of the Picnic signature scheme
- Simple power analysis attack on the QC-LDPC McEliece cryptosystem
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
- Side Channels in the McEliece PKC
- Masking large keys in hardware: a masked implementation of McEliece
- Practical power analysis attacks on software implementations of McEliece
This page was built for publication: Differential power analysis of a McEliece cryptosystem
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2794516)