A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem
2016
IEEE Transactions on Information Forensics and Security
This work presents horizontal and vertical side channel analysis techniques for an implementation of the McEliece cryptosystem. ...
Target of this side-channel attack is a state-of-the-art FPGA implementation of the efficient QC-MDPC McEliece decryption operation as presented at DATE 2014. ...
CONCLUSION This work presents horizontal and vertical side channel analysis techniques for a state-of-the-art McEliece implementation based on quasi-cyclic MDPC codes. ...
doi:10.1109/tifs.2015.2509944
fatcat:qptzcmrjdvhbxju7rb2o4rpw4m
Differential Power Analysis of a McEliece Cryptosystem
[chapter]
2015
Lecture Notes in Computer Science
This work presents the first differential power analysis of an implementation of the McEliece cryptosystem. ...
It consists of a combination of a differential leakage analysis during the syndrome computation followed by an algebraic step that exploits the relation between the public and private key. ...
RS is supported by NATO's Public Diplomacy Division in the framework of "Science for Peace", Project MD.SFPP 984520. ...
doi:10.1007/978-3-319-28166-7_26
fatcat:4c3icv5trrdqdanvgpiein3lom
A toolbox for software optimization of QC-MDPC code-based cryptosystems
[article]
2017
IACR Cryptology ePrint Archive
It also assesses methods for side channel protection of the implementations, and their performance costs. ...
These optimized primitives offer a useful toolbox that can be used, in various ways, by designers and implementers of QC-MDPC cryptosystems. ...
Opinions, findings, conclusions, and recommendations, expressed in this material, are those of the author(s), and do not necessarily reflect the views of their employers and the granting agencies. ...
dblp:journals/iacr/DruckerG17
fatcat:n2wv7p4c5vd6boqsqcj4gwpzgq
A Centralized Key Management Scheme Based on McEliece PKC for Space Network
2020
IEEE Access
To solve this problem, we proposed a centralized and identity-based key management scheme by using McEliece public-key cryptosystem (PKC). ...
Furthermore, the McEliece public-key cryptosystem can resist the quantum attack and provide error correction capacity. It improves the efficiency of the group key distribution over the noisy channel. ...
FIGURE 3 . 3 The comparison of message cost in different phase with 100 nodes.In FIGURE. 3, the horizontal axis is the simulation time, the vertical axis is the message number. ...
doi:10.1109/access.2020.2976753
fatcat:g7wcrtqgvzcjpejtou6os4apfe
A Study on the SCA Trends for Application to IoT Devices
2020
Journal of Internet Services and Information Security
Over the past 20 years, side-channel analysis (SCA) on IC Chip has mainly taken place. ...
In particular, single-trace attacks that only use side-channel information are actively studied; it eliminates the need for information about the input and output values of cryptographic algorithms. ...
Acknowledgments This work was supported as part of Military Crypto Research Center (UD170109ED) funded by Defense Acquisition Program Administration (DAPA) and Agency for Defense Development (ADD). ...
doi:10.22667/jisis.2020.02.29.002
dblp:journals/jisis/SimH20
fatcat:4sjvs66efzfctfw3v5emu7yezi
Post-Quantum Biometric Authentication Based on Homomorphic Encryption and Classic McEliece
2023
Applied Sciences
based on the Classic McEliece public-key encryption algorithm, which is a round 4 candidate of the NIST post-quantum standardization process. ...
A practical implementation of a non-device-centric facial authentication system is illustrated based on the generation and comparison of protected FaceNet embeddings. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/app13020757
fatcat:25vbubapkfgsfbrsrlaawfadaa
Noise Modulation-Based Reversible Data Hiding with McEliece Encryption
2022
Security and Communication Networks
McEliece cryptosystem is expected to be the next generation of the cryptographic algorithm due to its ability to resist quantum computing attacks. ...
In this article, we analysed and proved that there is a redundancy in the McEliece encryption process that is suitable for embedding. ...
Acknowledgments is work was supported by the National Natural Science Foundation of China, under grants nos. 61872384, 62102450, 62102451, and 62202496. ...
doi:10.1155/2022/4671799
fatcat:oeztre6dsra4tji3ju7vtgmfvu
Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography
2019
Transactions on Cryptographic Hardware and Embedded Systems
This countermeasure was later found to become vulnerable to a differential power analysis (DPA) in private syndrome computation, as described by Rossi et al. at CHES 2017. ...
Our experiments show that the BIKE and LEDAcrypt may become vulnerable to our proposed attacks. ...
We also thank Dukjae Moon of Samsung SDS for his valuable feedback and many helpful discussions. ...
doi:10.13154/tches.v2019.i4.180-212
dblp:journals/tches/SimKCCPH19
fatcat:yurx2sk42bdabpnirggnnds4fe
Post Quantum Cryptography: Techniques, Challenges, Standardization, and Directions for Future Research
[article]
2022
arXiv
pre-print
cryptography standardization process, and finally provides a couple of future research directions in this field. ...
Grover's search algorithm gives a square root time boost for the searching of the key in symmetric schemes like AES and 3DES. ...
More analysis on floatingpoint operations causing errors and side-channel attacks have to be done. Also, more study on its sampler has to be done. ...
arXiv:2202.02826v1
fatcat:ghq4lqiu4rf5vpuv6gbk7ws4jm
Integer Syndrome Decoding in the Presence of Noise
[article]
2022
IACR Cryptology ePrint Archive
A recent line of work considers augmented versions of this strategy, with hints typically provided by side-channel information. ...
We provide experimental results on cryptographic parameters for the BIKE and Classic McEliece cryptosystems, which are finalist and alternate candidates for the third round of the NIST standardization ...
the SDP, for which additional information is available, for instance via side-channel analysis on implementations of the aforementioned cryptosystems. ...
dblp:journals/iacr/DragoiCCG22
fatcat:xc5u4lqq5jbmfdc4p6u3vt35sm
Joint Encryption and Error Correction Technical Research Applied an Efficient Turbo Code
2015
International Journal of Security and Its Applications
Through the combination of encryption technology and channel coding technology and performance by one step, we will build a joint encryption error correction (JEEC) encoding scheme and a comprehensive ...
the encryption technology and channel coding technology and achieved by one step[9], making it a comprehensive technical program and applied to information transmission. ...
The authors would like to thank the editor and reviewer for the helpful comments on the manuscripts. ...
doi:10.14257/ijsia.2015.9.10.03
fatcat:uu4ha3to7rce7nytl6o6qoxbxe
Rank-Metric Codes and Their Applications
[article]
2022
arXiv
pre-print
Codes designed for the rank metric have attracted considerable attention in recent years, reinforced by network coding and further motivated by a variety of applications. ...
This survey gives a general introduction to rank-metric codes, explains their most important applications, and highlights their relevance to these areas of research. ...
Acknowledgements The work of L. Holzbaur and A. Wachter ...
arXiv:2203.12384v1
fatcat:brysqya7ynem5i25adxfwf5vl4
Quantum Computers' threat on Current Cryptographic Measures and Possible Solutions
2022
International Journal of Wireless and Microwave Technologies
Quantum computing is a hypothetical model, still in tentative analysis but is rapidly gaining traction among scientific communities. ...
The paper also aims to cover the fundamental concept of potential quantum-resilient cryptographic techniques and explain how they can be a solution to complete secure key distribution in a post-quantum ...
The photons on the sender side pass through a polarizer which randomly gives one of four possible combinations of four polarizations: Vertical, Horizontal, positive 45 degrees, or negative 45 degrees. ...
doi:10.5815/ijwmt.2022.05.02
fatcat:awmrc5h6efhnjor7yiylzaxh5q
Introduction to Quantum Cryptography
[chapter]
2013
Theory and Practice of Cryptography and Network Security Protocols and Technologies
Acknowledgements This work was conducted when Xiaoqing Tan visited the University of Toronto and is supported by the NSFC 61003258. ...
She especially thanks Hoi-Kwong Lo for the hospitality during her stay at the University of Toronto. ...
In BB84, Alice sends Bob a sequence of photons through an insecure quantum channel, each independently chosen from one of the four polarizations-vertical, horizontal, 45-degrees and 135-degrees.
2. ...
doi:10.5772/56092
fatcat:g2zu3rnwwnfn5akgrrpcoi675q
PQC-SEP: Power Side-channel Evaluation Platform for Post-Quantum Cryptography Algorithms
[article]
2022
IACR Cryptology ePrint Archive
It specifies ease of protection against side-channel analysis (SCA) as an essential selection criterion. ...
Following this trend, in this paper, we evaluate side-channel leakages of existing PQC implementations using PQC-SEP, a completely automated side-channel evaluation platform at both pre-and post-silicon ...
In [HCY20] , various side-channel techniques, such as vertical correlation power analysis, horizontal in-depth correlation power analysis (HICPA), online template attacks, and chosen-input simple power ...
dblp:journals/iacr/ParkASMPRFT22
fatcat:raohv4kwsrbjrefacmbcjmcfs4
« Previous
Showing results 1 — 15 out of 30 results