A Timing Attack against the Secret Permutation in the McEliece PKC
From MaRDI portal
Publication:3569140
DOI10.1007/978-3-642-12929-2_8zbMath1284.94115OpenAlexW1602905584MaRDI QIDQ3569140
Publication date: 17 June 2010
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-12929-2_8
Related Items (7)
Toward secure implementation of McEliece decryption ⋮ On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes ⋮ Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures ⋮ Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems ⋮ DAGS: key encapsulation using dyadic GS codes ⋮ Differential Power Analysis of a McEliece Cryptosystem ⋮ A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
This page was built for publication: A Timing Attack against the Secret Permutation in the McEliece PKC