메뉴 건너뛰기




Volumn 5747 LNCS, Issue , 2009, Pages 49-64

MicroEliece: McEliece for embedded devices

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOSYSTEMS; DISCRETE LOGARITHM PROBLEMS; EFFICIENT IMPLEMENTATION; EMBEDDED DEVICE; LINEAR BINARY CODE; MCELIECE; MCELIECE ENCRYPTION SCHEME; NP COMPLETE; PUBLIC KEYS; XILINX SPARTAN-3;

EID: 70350591229     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04138-9_4     Document Type: Conference Paper
Times cited : (59)

References (29)
  • 1
    • 70350609016 scopus 로고    scopus 로고
    • Algorithms and Keysizes
    • ECRYPT, Technical report, D.SPA.28 Rev. 1.1, IST-2002-507932 ECRYPT July
    • ECRYPT. Yearly Report on Algorithms and Keysizes (2007-2008). Technical report, D.SPA.28 Rev. 1.1, IST-2002-507932 ECRYPT (July 2008)
    • (2008) Yearly Report on
  • 2
    • 70350597117 scopus 로고    scopus 로고
    • 8-bit XMEGA A Microcontroller
    • Atmel Corp, February 2009
    • Atmel Corp. 8-bit XMEGA A Microcontroller. User Guide (February 2009), http://www.atmel.com/dyn/resources/prod-documents/doc8077.pdf
    • User Guide
  • 3
    • 84944878686 scopus 로고    scopus 로고
    • Bailey, D.V., Coffin, D., Elbirt, A., Silverman, J.H., Woodbury, A.D.: NTRU in Constrained Devices. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, 2162, pp. 262-272. Springer, Heidelberg (2001)
    • Bailey, D.V., Coffin, D., Elbirt, A., Silverman, J.H., Woodbury, A.D.: NTRU in Constrained Devices. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 262-272. Springer, Heidelberg (2001)
  • 6
    • 56749100757 scopus 로고    scopus 로고
    • List Decoding for Binary Goppa Codes
    • Technical report
    • Bernstein, D.J.: List Decoding for Binary Goppa Codes. Technical report (2008), http://cr.yp.to/codes/goppalist-20081107.pdf
    • (2008)
    • Bernstein, D.J.1
  • 8
    • 56749164782 scopus 로고    scopus 로고
    • Attacking and Defending theMcEliece Cryptosystem
    • Buchmann, J, Ding, J, eds, PQCrypto 2008, Springer, Heidelberg
    • Bernstein, D.J., Lange, T., Peters, C.: Attacking and Defending theMcEliece Cryptosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5299 , pp. 31-46
    • Bernstein, D.J.1    Lange, T.2    Peters, C.3
  • 9
    • 70350581536 scopus 로고    scopus 로고
    • Beuchat, J.-L., Sendrier, N., Tisserand, A., Villard, G.: FPGA Implementation of a Recently Published Signature Scheme. Technical report, INRIA - Institut National de Recherche en Informatique et en Automatique (2004), http://hal.archives-ouvertes.fr/docs/00/07/70/45/PDF/RR-5158.pdf
    • Beuchat, J.-L., Sendrier, N., Tisserand, A., Villard, G.: FPGA Implementation of a Recently Published Signature Scheme. Technical report, INRIA - Institut National de Recherche en Informatique et en Automatique (2004), http://hal.archives-ouvertes.fr/docs/00/07/70/45/PDF/RR-5158.pdf
  • 11
    • 51049092298 scopus 로고    scopus 로고
    • Bogdanov, A., Eisenbarth, T., Rupp, A., Wolf, C.: Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves? In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, 5154, pp. 45-61. Springer, Heidelberg (2008)
    • Bogdanov, A., Eisenbarth, T., Rupp, A., Wolf, C.: Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves? In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 45-61. Springer, Heidelberg (2008)
  • 12
    • 35248899532 scopus 로고    scopus 로고
    • Chari, S., Rao, J.R., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, 2523, pp. 13-28. Springer, Heidelberg (2003)
    • Chari, S., Rao, J.R., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13-28. Springer, Heidelberg (2003)
  • 13
    • 56749092208 scopus 로고    scopus 로고
    • Comparison of Innovative Signature Algorithms for WSNs
    • ACM, New York
    • Driessen, B., Poschmann, A., Paar, C.: Comparison of Innovative Signature Algorithms for WSNs. In: Proceedings of ACM WiSec 2008. ACM, New York (2008)
    • (2008) Proceedings of ACM WiSec
    • Driessen, B.1    Poschmann, A.2    Paar, C.3
  • 17
    • 70350592745 scopus 로고    scopus 로고
    • Gura, N., Patel, A.,Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 925-943. Springer, Heidelberg (2004)
    • Gura, N., Patel, A.,Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 925-943. Springer, Heidelberg (2004)
  • 18
    • 77956272749 scopus 로고    scopus 로고
    • Helion Technology Inc. Modular Exponentiation Core Family for Xilinx FPGA, October
    • Helion Technology Inc. Modular Exponentiation Core Family for Xilinx FPGA. Data Sheet (October 2008), http://www.heliontech.com/downloads/modexp- xilinx-datasheet.pdf
    • (2008) Data Sheet
  • 19
    • 0029755739 scopus 로고    scopus 로고
    • Note on decoding binary Goppa codes
    • Huber, K.: Note on decoding binary Goppa codes. Electronics Letters 32, 102-103 (1996)
    • (1996) Electronics Letters , vol.32 , pp. 102-103
    • Huber, K.1
  • 20
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 22
    • 70350592744 scopus 로고    scopus 로고
    • McEliece, R.J.: A Public-Key Cryptosystem Based On Algebraic Coding Theory. Deep Space Network Progress Report 44, 114-116 (1978)
    • McEliece, R.J.: A Public-Key Cryptosystem Based On Algebraic Coding Theory. Deep Space Network Progress Report 44, 114-116 (1978)
  • 27
    • 70350581538 scopus 로고    scopus 로고
    • Security Solutions Using Spartan-3 Generation FPGAs
    • April 2008
    • Smerdon, M.: Security Solutions Using Spartan-3 Generation FPGAs. Whitepaper (April 2008), http://www.xilinx.com/support/documentation/white- papers/wp266.pdf
    • Whitepaper
    • Smerdon, M.1
  • 28
    • 56749169082 scopus 로고    scopus 로고
    • Side Channels in the McEliece PKC
    • Buchmann, J, Ding, J, eds, PQCrypto 2008, Springer, Heidelberg
    • Strenzke, F., Tews, E., Molter, H., Overbeck, R., Shoufan, A.: Side Channels in the McEliece PKC. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 216-229. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5299 , pp. 216-229
    • Strenzke, F.1    Tews, E.2    Molter, H.3    Overbeck, R.4    Shoufan, A.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.