A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial
From MaRDI portal
Publication:6186339
DOI10.1007/978-3-031-37679-5_5MaRDI QIDQ6186339
Morgan Barbier, Jean Belo Klamti, Pierre-Louis Cayrel, Vincent Grosso, Idy Diop, Brice Colombier, Vlad-Florin Drăgoi, Boly Seck
Publication date: 2 February 2024
Published in: Progress in Cryptology - AFRICACRYPT 2023 (Search for Journal in Brave)
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
- FPGA-based Niederreiter cryptosystem using binary Goppa codes
- Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem
- Effective attack on the McEliece cryptosystem based on Reed-Muller codes
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
- ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research
- Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes
- McBits: Fast Constant-Time Code-Based Cryptography
- Square Code Attack on a Modified Sidelnikov Cryptosystem
- Practical Power Analysis Attacks on Software Implementations of McEliece
- A public-key cryptosystem based on binary Reed-Muller codes
- Rapid solution of problems by quantum computation
- On the inherent intractability of certain coding problems (Corresp.)
- Weak keys in the McEliece public-key cryptosystem
- A fast new DES implementation in software
- McBits Revisited
- Power Analysis Attacks
- Punctured syndrome decoding problem. Efficient side-channel attacks against \textit{Classic McEliece}
- Decoding McEliece with a hint -- secret Goppa key parts reveal everything