Practical power analysis attacks on software implementations of McEliece
From MaRDI portal
Publication:3569141
DOI10.1007/978-3-642-12929-2_9zbMATH Open1284.94077OpenAlexW1849065680MaRDI QIDQ3569141FDOQ3569141
Authors: Stefan Heyse, Amir Moradi, Christof Paar
Publication date: 17 June 2010
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-12929-2_9
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cited In (17)
- Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures
- Differential power analysis of a McEliece cryptosystem
- Title not available (Why is that?)
- Simple power analysis attack on the QC-LDPC McEliece cryptosystem
- A timing attack against the secret permutation in the McEliece PKC
- MicroEliece: McEliece for Embedded Devices
- Polar differential power attacks and evaluation
- Improved power analysis attacks on Falcon
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
- A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial
- An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks
- S-semantics -- an example
- McEliece
- Information-set decoding with hints
- Side Channels in the McEliece PKC
- Masking large keys in hardware: a masked implementation of McEliece
- Overview of the McEliece cryptosystem and its security
Uses Software
This page was built for publication: Practical power analysis attacks on software implementations of McEliece
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3569141)