2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applicat 2021
DOI: 10.1109/idaacs53288.2021.9660833
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of the Classic McEliece Key Encapsulation Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…It also has the smallest ciphertexts compared to other KEM candidates. However, a drawback regarding the potential adoption of these cryptosystems lies in the use of the Goppa codes to determine the public key, which results in a large public key matrix [34]. Consequently, key generation is the slowest and most resource-intensive aspect of the system, which makes it less feasible for embedded devices, therefore it was not included in this study, although it is still part of the NIST selection process.…”
Section: B) Classic Mceliecementioning
confidence: 99%
“…It also has the smallest ciphertexts compared to other KEM candidates. However, a drawback regarding the potential adoption of these cryptosystems lies in the use of the Goppa codes to determine the public key, which results in a large public key matrix [34]. Consequently, key generation is the slowest and most resource-intensive aspect of the system, which makes it less feasible for embedded devices, therefore it was not included in this study, although it is still part of the NIST selection process.…”
Section: B) Classic Mceliecementioning
confidence: 99%