2010
DOI: 10.1007/978-3-642-12929-2_9
|View full text |Cite
|
Sign up to set email alerts
|

Practical Power Analysis Attacks on Software Implementations of McEliece

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
47
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(48 citation statements)
references
References 26 publications
1
47
0
Order By: Relevance
“…We did not implement an actual verification, but simply compare the guess for the support with the correct support Γ . As already mentioned, in [13] the procedure that had to be used in a real life attack is described. It involves only some linear algebra operations on the public key and the invocation of an EEA and would not perceptibly increase the time for solving, given the small numbers of such final verifications occurring in the attacks.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…We did not implement an actual verification, but simply compare the guess for the support with the correct support Γ . As already mentioned, in [13] the procedure that had to be used in a real life attack is described. It involves only some linear algebra operations on the public key and the invocation of an EEA and would not perceptibly increase the time for solving, given the small numbers of such final verifications occurring in the attacks.…”
Section: Resultsmentioning
confidence: 99%
“…Whenever in such a chain of guesses a solution for all β si is found, a guess for the whole support Γ = (α i |α i = j∈Bi β j ) is implied, which has to be checked by a means of key recovery, as described in [13].…”
Section: Description Of the Attack Proceduresmentioning
confidence: 99%
See 1 more Smart Citation
“…Once again, results show that Mc Eliece's cryptosystem gives better results compared to RSA but not compared to elliptic cryptosystems.. A smart card implementation (16 bits processor) is described in [102], ciphering and deciphering is done in less than 2 seconds for a 2048 code length. Hardware implementations of Mc Eliece's cryptosystem gave rise to several side channel attacks [103,98,66,27,80].…”
Section: Hardware and Software Implementationsmentioning
confidence: 99%
“…Overall code-based cryptography represents one of the few credible alternative to classical cryptography, and one attends to a rising interest in the cryptographic community for these systems, in particular practical implementation of such code-based schemes on smart cards, embedded devices or PC, have begun to be presented in conferences likes CHES or CARDIS ( [17], [11], [23], [7]). …”
Section: Introductionmentioning
confidence: 99%