메뉴 건너뛰기




Volumn 5299 LNCS, Issue , 2008, Pages 216-229

Side channels in the McEliece PKC

Author keywords

Post quantum cryptography; Side channel attack; Timing attack

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY; QUANTUM COMPUTERS; QUANTUM CRYPTOGRAPHY; QUANTUM THEORY;

EID: 56749169082     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88403-3_15     Document Type: Conference Paper
Times cited : (65)

References (24)
  • 2
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120-126 (1978)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 3
    • 85015402934 scopus 로고
    • Use of Elliptic Curves in Cryptography
    • Williams, H.C, ed, CRYPTO 1985, Springer, Heidelberg
    • Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417-426. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 4
    • 84874800178 scopus 로고
    • A Public Key Cryptosystem and A Signature Based on Discrete Logarims
    • ElGamal, T.: A Public Key Cryptosystem and A Signature Based on Discrete Logarims. IEEE Transactions on Information Theory (1985)
    • (1985) IEEE Transactions on Information Theory
    • ElGamal, T.1
  • 6
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial time algorithms for prime factorization and discrete logarithms on a quantum computer
    • Shor, P.W.: Polynomial time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing 26(5), 1484-1509 (1997)
    • (1997) SIAM Journal on Computing , vol.26 , Issue.5 , pp. 1484-1509
    • Shor, P.W.1
  • 7
    • 33745943619 scopus 로고    scopus 로고
    • Shor's discrete logarithm quantum algorithm for elliptic curves, Technical Report
    • quant-ph/0301141, arXiv
    • Proos, J., Zalka, C.: Shor's discrete logarithm quantum algorithm for elliptic curves, Technical Report quant-ph/0301141, arXiv (2006)
    • (2006)
    • Proos, J.1    Zalka, C.2
  • 10
    • 56749148570 scopus 로고    scopus 로고
    • McEliece, R.J.: A public key cryptosystem based on algebraic coding theory. DSN progress report 42-44, 114-116 (1978)
    • McEliece, R.J.: A public key cryptosystem based on algebraic coding theory. DSN progress report 42-44, 114-116 (1978)
  • 11
    • 56749146472 scopus 로고    scopus 로고
    • Korbara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems -conversions for McEliece PKC In: Kim, K.-c. (ed.) PKC 2001. LNCS, 1992. Springer, Heidelberg (2001)
    • Korbara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems -conversions for McEliece PKC In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992. Springer, Heidelberg (2001)
  • 14
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
    • Kocher, P.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS. vol. 1666. pp. 388-397. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1
  • 16
    • 27244432445 scopus 로고    scopus 로고
    • Schindler, W., Lemke, K., Paar, C.: A Stochastic Model for Differential Side Channel Cryptanalysis. In: Rao. J.R., Sunar. B. (eds.) CHES 2005. LNCS, 3659, pp. 30-46. Springer, Heidelberg (2005)
    • Schindler, W., Lemke, K., Paar, C.: A Stochastic Model for Differential Side Channel Cryptanalysis. In: Rao. J.R., Sunar. B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30-46. Springer, Heidelberg (2005)
  • 20
    • 0031675932 scopus 로고    scopus 로고
    • A new algorithm for finding minimum-weight words in a linear code: Application to primitive narrow-sense BCH-codes of length 511
    • Canteaut, A., Chabaud, F.: A new algorithm for finding minimum-weight words in a linear code: application to primitive narrow-sense BCH-codes of length 511. IEEE Transactions on Information Theory 44(1), 367-378 (1998)
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.1 , pp. 367-378
    • Canteaut, A.1    Chabaud, F.2
  • 21
    • 56749098577 scopus 로고    scopus 로고
    • Pointcheval. D.: Chosen-chipertext security for anyone-way cryptosystem. In: Imai, H., Zheng. Y. (eds.) PKC 2000. LNCS, 1751, pp. 129-146. Springer, Heidelberg (2000)
    • Pointcheval. D.: Chosen-chipertext security for anyone-way cryptosystem. In: Imai, H., Zheng. Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 129-146. Springer, Heidelberg (2000)
  • 23
    • 56749125387 scopus 로고    scopus 로고
    • Schindler, W., Aciiçmez, O.: A Vulnerability in RSA Implementations due to Instruction Cache Analysis and its Demonstration on OpenSSL. In: Malkin, T. (ed.) CT-RSA 2008. LNCS. 4964, Springer, Heidelberg (2008)
    • Schindler, W., Aciiçmez, O.: A Vulnerability in RSA Implementations due to Instruction Cache Analysis and its Demonstration on OpenSSL. In: Malkin, T. (ed.) CT-RSA 2008. LNCS. vol. 4964, Springer, Heidelberg (2008)
  • 24
    • 56749172810 scopus 로고    scopus 로고
    • Aciiçmez, O., Seifert, J.P., Koç. Ç.: Predicting secret keys via branch prediction. In: Abe, M. (ed.) CT-RSA 2007. LNCS, 4377. Springer, Heidelberg (2007)
    • Aciiçmez, O., Seifert, J.P., Koç. Ç.: Predicting secret keys via branch prediction. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377. Springer, Heidelberg (2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.