Key-recovery fault injection attack on the classic McEliece KEM
DOI10.1007/978-3-031-29689-5_3zbMATH Open1519.94183OpenAlexW4361768715MaRDI QIDQ6132748FDOQ6132748
Authors: Sabine Pircher, Johannes Geier, Julian Danner, Daniel Mueller-Gritschneder, Antonia Wachter-Zeh
Publication date: 17 August 2023
Published in: Code-Based Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-29689-5_3
Recommendations
- Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
- Fault-enabled chosen-ciphertext attacks on Kyber
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
- A new key recovery side-channel attack on HQC with chosen ciphertext
fault attackpost-quantum cryptographykey recoverykey encapsulation mechanismlaser fault injectionsclassic McEliece
Cites Work
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- The algebraic decoding of Goppa codes
- Title not available (Why is that?)
- Title not available (Why is that?)
- On the inherent intractability of certain coding problems (Corresp.)
- Shift-register synthesis and BCH decoding
- Title not available (Why is that?)
- A method for solving key equation for decoding goppa codes
- Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
- Decoding McEliece with a hint -- secret Goppa key parts reveal everything
Cited In (4)
- A fault attack on the Niederreiter cryptosystem using binary irreducible Goppa codes
- Key recovery attack on McNie based on low rank parity check codes and its reparation
- Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
This page was built for publication: Key-recovery fault injection attack on the classic McEliece KEM
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6132748)