Practical power analysis attacks on software implementations of McEliece. The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptographic algorithms, e.g. McEliece, on microprocessor-based platforms has been extremely raised due to the increasing storage space of these platforms. Therefore, their vulnerability and robustness against physical attacks, e.g., state-of-the-art power analysis attacks, must be investigated. In this work, we address mainly two power analysis attacks on various implementations of McEliece on an 8-bit AVR microprocessor. To the best of our knowledge, this is the first time that such side-channel attacks are practically evaluated.

References in zbMATH (referenced in 250 articles , 1 standard article )

Showing results 1 to 20 of 250.
Sorted by year (citations)

1 2 3 ... 11 12 13 next

  1. Epelde, Markel; Rúa, Ignacio F.: Cardinal rank metric codes over Galois rings (2022)
  2. Ghatak, Anirban: Extending Coggia-Couvreur attack on Loidreau’s rank-metric cryptosystem (2022)
  3. Santini, Paolo; Persichetti, Edoardo; Baldi, Marco: Reproducible families of codes and cryptographic applications (2022)
  4. Aragon, Nicolas; Baldi, Marco; Deneuville, Jean-Christophe; Khathuria, Karan; Persichetti, Edoardo; Santini, Paolo: Cryptanalysis of a code-based full-time signature (2021)
  5. Branco, Pedro: A post-quantum UC-commitment scheme in the global random oracle model from code-based assumptions (2021)
  6. Cayrel, Pierre-Louis; Colombier, Brice; Drăgoi, Vlad-Florin; Menu, Alexandre; Bossuet, Lilian: Message-recovery laser fault injection attack on the \textitclassicMcEliece cryptosystem (2021)
  7. Drucker, Nir; Gueron, Shay; Kostic, Dusan: Fast polynomial inversion for post quantum QC-MDPC cryptography (2021)
  8. El Khalfaoui, Sabira; Nagy, Gábor P.: On the dimension of the subfield subcodes of 1-point Hermitian codes (2021)
  9. Hashim, H. R.; Molnár, A.; Tengely, Sz.: Cryptanalysis of ITRU (2021)
  10. Khathuria, Karan; Rosenthal, Joachim; Weger, Violetta: Encryption scheme based on expanded Reed-Solomon codes (2021)
  11. Kim, Jon-Lark; Kim, Young-Sik; Galvez, Lucky Erap; Kim, Myeong Jae: A modified Dual-Ouroboros public-key encryption using Gabidulin codes (2021)
  12. Mahdjoubi, Roumaissa; Cayrel, Pierre Louis; Akleylek, Sedat; Kenza, Guenda: A novel Niederreiter-like cryptosystem based on the ((u|u + \upsilon))-construction codes (2021)
  13. Renner, Julian; Puchinger, Sven; Wachter-Zeh, Antonia: LIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decoding (2021)
  14. Yan, Di; Yu, Yu; Liu, Hanlin; Zhao, Shuoyao; Zhang, Jiang: An improved algorithm for learning sparse parities in the presence of noise (2021)
  15. Aragon, Nicolas; Blazy, Olivier; Deneuville, Jean-Christophe; Gaborit, Philippe; Lau, Terry Shue Chien; Tan, Chik How; Xagawa, Keita: Cryptanalysis of a rank-based signature with short public keys (2020)
  16. Banegas, Gustavo; Barreto, Paulo S. L. M.; Persichetti, Edoardo; Santini, Paolo: Designing efficient dyadic operations for cryptographic applications (2020)
  17. Bootland, Carl; Castryck, Wouter; Szepieniec, Alan; Vercauteren, Frederik: A framework for cryptographic problems from linear algebra (2020)
  18. Branco, Pedro; Mateus, Paulo; Salema, Carlos; Souto, André: Using low-density parity-check codes to improve the McEliece cryptosystem (2020)
  19. Cascudo, Ignacio; Gundersen, Jaron Skovsted; Ruano, Diego: Squares of matrix-product codes (2020)
  20. Coggia, Daniel; Couvreur, Alain: On the security of a Loidreau rank metric code based encryption scheme (2020)

1 2 3 ... 11 12 13 next