McEliece

Practical power analysis attacks on software implementations of McEliece. The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptographic algorithms, e.g. McEliece, on microprocessor-based platforms has been extremely raised due to the increasing storage space of these platforms. Therefore, their vulnerability and robustness against physical attacks, e.g., state-of-the-art power analysis attacks, must be investigated. In this work, we address mainly two power analysis attacks on various implementations of McEliece on an 8-bit AVR microprocessor. To the best of our knowledge, this is the first time that such side-channel attacks are practically evaluated.


References in zbMATH (referenced in 173 articles , 1 standard article )

Showing results 1 to 20 of 173.
Sorted by year (citations)

1 2 3 ... 7 8 9 next

  1. Fabšič, Tomáš; Grošek, Otokar; Nemoga, Karol; Zajac, Pavol: On generating invertible circulant binary matrices with a prescribed number of ones (2018)
  2. Horlemann-Trautmann, Anna-Lena; Marshall, Kyle; Rosenthal, Joachim: Extension of Overbeck’s attack for Gabidulin-based cryptosystems (2018)
  3. Raviv, Netanel; Yaakobi, Eitan; Médard, Muriel: Coding for locality in reconstructing permutations (2018)
  4. Alamélou, Quentin; Blazy, Olivier; Cauchie, Stéphane; Gaborit, Philippe: A code-based group signature scheme (2017)
  5. Berger, Thierry P.; Gueye, Cheikh Thiécoumba; Klamti, Jean Belo: A NP-complete problem in coding theory with application to code based cryptography (2017)
  6. Bolkema, Jessalyn; Gluesing-Luerssen, Heide; Kelley, Christine A.; Lauter, Kristin E.; Malmskog, Beth; Rosenthal, Joachim: Variations of the McEliece cryptosystem (2017)
  7. Cayrel, Pierre-Louis; Gueye, Cheikh Thiecoumba; Mboup, El Hadji Modou; Ndiaye, Ousmane; Persichetti, Edoardo: Efficient implementation of hybrid encryption from coding theory (2017)
  8. Cayrel, Pierre-Louis; Meziani, Mohammed; Ndiaye, Ousmane; Lindner, Richard; Silva, Rosemberg: A pseudorandom number generator based on worst-case lattice problems (2017)
  9. Costello, Craig; Jao, David; Longa, Patrick; Naehrig, Michael; Renes, Joost; Urbanik, David: Efficient compression of SIDH public keys (2017)
  10. Couvreur, Alain; Márquez-Corbella, Irene; Pellikaan, Ruud: Cryptanalysis of McEliece cryptosystem based on algebraic geometry codes and their subcodes (2017)
  11. García-Planas, María Isabel; Magret, Maria Dolors; Um, Laurence Emilie: Monomial codes seen as invariant subspaces (2017)
  12. Gueye, Cheikh Thiécoumba; Klamti, Jean Belo; Hirose, Shoichi: Generalization of BJMM-ISD using May-Ozerov nearest neighbor algorithm over an arbitrary finite field $\mathbb F_q$ (2017)
  13. Horlemann-Trautmann, Anna-Lena; Marshall, Kyle: New criteria for MRD and Gabidulin codes and some rank-metric code constructions (2017)
  14. Li, Shuxing: The minimum distance of some narrow-sense primitive BCH codes (2017)
  15. Puchinger, Sven; Müelich, Sven; Ishak, Karim; Bossert, Martin: Code-based cryptosystems using generalized concatenated codes (2017)
  16. Yang, Shudi; Yao, Zheng-An; Zhao, Chang-An: The weight distributions of two classes of $p$-ary cyclic codes with few weights (2017)
  17. Zajac, Pavol: Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity (2017)
  18. Applebaum, Benny: Cryptographic hardness of random local functions. Survey (2016)
  19. Baldi, Marco; Bianchi, Marco; Chiaraluce, Franco; Rosenthal, Joachim; Schipani, Davide: Enhanced public key security for the McEliece cryptosystem (2016)
  20. Bardet, Magali; Chaulet, Julia; Dragoi, Vlad; Otmani, Ayoub; Tillich, Jean-Pierre: Cryptanalysis of the McEliece public key cryptosystem based on polar codes (2016)

1 2 3 ... 7 8 9 next