1992
DOI: 10.1515/dma.1992.2.4.439
|View full text |Cite
|
Sign up to set email alerts
|

On insecurity of cryptosystems based on generalized Reed-Solomon codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
156
0
2

Year Published

1994
1994
2019
2019

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 185 publications
(158 citation statements)
references
References 0 publications
0
156
0
2
Order By: Relevance
“…Once again, results show that Mc Eliece's cryptosystem gives better results compared to RSA but not compared to elliptic cryptosystems.. A smart card implementation (16 bits processor) is described in [102], ciphering and deciphering is done in less than 2 seconds for a 2048 code length. Hardware implementations of Mc Eliece's cryptosystem gave rise to several side channel attacks [103,98,66,27,80].…”
Section: Hardware and Software Implementationsmentioning
confidence: 99%
“…Once again, results show that Mc Eliece's cryptosystem gives better results compared to RSA but not compared to elliptic cryptosystems.. A smart card implementation (16 bits processor) is described in [102], ciphering and deciphering is done in less than 2 seconds for a 2048 code length. Hardware implementations of Mc Eliece's cryptosystem gave rise to several side channel attacks [103,98,66,27,80].…”
Section: Hardware and Software Implementationsmentioning
confidence: 99%
“…Their paper contained no evidence to substantiate their claim, and most cryptographers discount the result. Another Russian attack, one that cannot be used directly against the McEliece system, is in [1447,1448]. Extensions to McEliece can be found in [424,1227,976].…”
Section: Private Key: X < Pmentioning
confidence: 99%
“…In its original paper [6] Niederreiter proposed the class of Generalized Reed-Solomon (GRS) codes over F 2 m . However, Sidelnikov and Shestakov in [8] introduced an algorithm that, in polynomial time, permits us to discover the structure of the secret GRS code used in the cryptosystem. Therefore, the initial Niederreiter scheme is completely broken.…”
Section: Introductionmentioning
confidence: 99%