2015
DOI: 10.1145/2736284
|View full text |Cite
|
Sign up to set email alerts
|

Optimized and Scalable Co-Processor for McEliece with Binary Goppa Codes

Abstract: Asymmetric cryptographic primitives are essential to enable secure communications in public networks or public mediums. Such primitives can be deployed as software libraries or hardware co-processors, the latter being more commonly employed in systems on chip (SoC) scenarios, embedded devices, or application-specific servers. Unfortunately, the most commonly available solutions, based on RSA or elliptic curve cryptography (ECC), are highly processing intensive due to the underlying extended-precision modular a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 37 publications
0
5
0
Order By: Relevance
“…A comparison to the QC-MDPC decoder from [23] showed that the proposed GC decoder is three times faster and requires less than 1% of the logic of the QC-MDPC decoder for the same security category. Similarly, the GC decoder outperforms the decoder for binary Goppa codes from [24] for the same security level. In [24], several implementations were proposed, where the one with the lowest area requirements needs about 2.5 times more logic and the number of clock cycles is about 8 times higher compared to the GC decoder.…”
Section: Comparison With Other Code-based Cryptosystemsmentioning
confidence: 90%
See 2 more Smart Citations
“…A comparison to the QC-MDPC decoder from [23] showed that the proposed GC decoder is three times faster and requires less than 1% of the logic of the QC-MDPC decoder for the same security category. Similarly, the GC decoder outperforms the decoder for binary Goppa codes from [24] for the same security level. In [24], several implementations were proposed, where the one with the lowest area requirements needs about 2.5 times more logic and the number of clock cycles is about 8 times higher compared to the GC decoder.…”
Section: Comparison With Other Code-based Cryptosystemsmentioning
confidence: 90%
“…Similarly, the GC decoder outperforms the decoder for binary Goppa codes from [24] for the same security level. In [24], several implementations were proposed, where the one with the lowest area requirements needs about 2.5 times more logic and the number of clock cycles is about 8 times higher compared to the GC decoder.…”
Section: Comparison With Other Code-based Cryptosystemsmentioning
confidence: 90%
See 1 more Smart Citation
“…Various algorithms are available for solving the key equation of binary Goppa codes. Since Goppa codes are a sub-class of alternant codes, algorithms designed for alternant codes can be utilized in the decoding process of Goppa codes [MBR15]. However, when applying algorithms, which were not specifically designed for Goppa codes, only t/2 errors can be corrected directly, while the Classic McEliece KEM requires a correction capability of t errors.…”
Section: Decoding Binary Goppa Codesmentioning
confidence: 99%
“…Note, that the combined double-sized syndrome computation and polynomial evaluation approach was developed independently from another implementation, which also combines these two operations[MBR15]. However, the implementation of Massolino et al employs a different dataflow and does not consider interleaving of syndrome and error-locator polynomial computations.…”
mentioning
confidence: 99%