Practical power analysis attacks on software implementations of McEliece. The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptographic algorithms, e.g. McEliece, on microprocessor-based platforms has been extremely raised due to the increasing storage space of these platforms. Therefore, their vulnerability and robustness against physical attacks, e.g., state-of-the-art power analysis attacks, must be investigated. In this work, we address mainly two power analysis attacks on various implementations of McEliece on an 8-bit AVR microprocessor. To the best of our knowledge, this is the first time that such side-channel attacks are practically evaluated.

References in zbMATH (referenced in 211 articles , 1 standard article )

Showing results 1 to 20 of 211.
Sorted by year (citations)

1 2 3 ... 9 10 11 next

  1. Aragon, Nicolas; Blazy, Olivier; Deneuville, Jean-Christophe; Gaborit, Philippe; Lau, Terry Shue Chien; Tan, Chik How; Xagawa, Keita: Cryptanalysis of a rank-based signature with short public keys (2020)
  2. Banegas, Gustavo; Barreto, Paulo S. L. M.; Persichetti, Edoardo; Santini, Paolo: Designing efficient dyadic operations for cryptographic applications (2020)
  3. Cascudo, Ignacio; Gundersen, Jaron Skovsted; Ruano, Diego: Squares of matrix-product codes (2020)
  4. Epelde, Markel; Larrucea, Xabier; Rúa, Ignacio F.: On quaternary Goppa codes (2020)
  5. Falk, Brett Hemenway; Heninger, Nadia; Rudow, Michael: Properties of constacyclic codes under the Schur product (2020)
  6. Gaborit, Philippe; Galvez, Lucky; Hauteville, Adrien; Kim, Jon-Lark; Kim, Myeong Jae; Kim, Young-Sik: Dual-Ouroboros: an improvement of the McNie scheme (2020)
  7. Lavauzelle, Julien; Renner, Julian: Cryptanalysis of a system based on twisted Reed-Solomon codes (2020)
  8. Neri, Alessandro: Systematic encoders for generalized Gabidulin codes and the (q)-analogue of Cauchy matrices (2020)
  9. Sayols, Narcís; Xambó-Descamps, Sebastià: Computer algebra tales on Goppa codes and McEliece cryptography (2020)
  10. Vedenev, K. V.; Deundyak, V. M.: Relationship between codes and idempotents in a dihedral group algebra (2020)
  11. Yardi, Arti D.; Vijayakumaran, Saravanan: Properties of syndrome distribution for blind reconstruction of cyclic codes (2020)
  12. Aydin, Nuh; Lambrinos, Jonathan; VandenBerg, Oliver: On equivalence of cyclic codes, generalization of a quasi-twisted search algorithm, and new linear codes (2019)
  13. Berger, Thierry P.; Gueye, Cheikh Thiécoumba; Klamti, Jean Belo; Ruatta, Olivier: Designing a public key cryptosystem based on quasi-cyclic subspace subcodes of Reed-Solomon codes (2019)
  14. Deundyak, Vladimir Mikhaĭlovich; Kosolapov, Yuriĭ Vladimirovich: The use of the direct sum decomposition algorithm for analyzing the strength of some McEliece-type cryptosystems (2019)
  15. Lau, Terry Shue Chien; Tan, Chik How: New rank codes based encryption scheme using partial circulant matrices (2019)
  16. Liu, Jie; Tong, Xiaojun; Wang, Zhu; Ma, Jing; Yi, Longteng: An improved Rao-Nam cryptosystem based on fractional order hyperchaotic system and EDF-QC-LDPC (2019)
  17. Liu, Jingang; Wang, Yongge; Yi, Zongxinag; Pei, Dingyi: Quantum resistant public key encryption scheme polarRLCE (2019)
  18. Liu, Xiangxin; Yang, Xiaoyuan; Han, Yiliang; Wang, Xu An: A secure and efficient code-based signature scheme (2019)
  19. Li, Zhe; Xing, Chaoping; Yeo, Sze Ling: Reducing the key size of McEliece cryptosystem from automorphism-induced Goppa codes via permutations (2019)
  20. Magamba, Kondwani; Ryan, John A.: Counting extended irreducible Goppa codes (2019)

1 2 3 ... 9 10 11 next