-
1
-
-
70350609016
-
Algorithms and Keysizes
-
ECRYPT, Technical report, D.SPA.28 Rev. 1.1, IST-2002-507932 ECRYPT July
-
ECRYPT. Yearly Report on Algorithms and Keysizes (2007-2008). Technical report, D.SPA.28 Rev. 1.1, IST-2002-507932 ECRYPT (July 2008)
-
(2008)
Yearly Report on
-
-
-
2
-
-
70350597117
-
8-bit XMEGA A Microcontroller
-
Atmel Corp, February 2009
-
Atmel Corp. 8-bit XMEGA A Microcontroller. User Guide (February 2009), http://www.atmel.com/dyn/resources/prod-documents/doc8077.pdf
-
User Guide
-
-
-
3
-
-
84944878686
-
-
Bailey, D.V., Coffin, D., Elbirt, A., Silverman, J.H., Woodbury, A.D.: NTRU in Constrained Devices. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, 2162, pp. 262-272. Springer, Heidelberg (2001)
-
Bailey, D.V., Coffin, D., Elbirt, A., Silverman, J.H., Woodbury, A.D.: NTRU in Constrained Devices. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 262-272. Springer, Heidelberg (2001)
-
-
-
-
5
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.A.: On the inherent intractability of certain coding problems. IEEE Trans. Information Theory 24(3), 384-386 (1978)
-
(1978)
IEEE Trans. Information Theory
, vol.24
, Issue.3
, pp. 384-386
-
-
Berlekamp, E.R.1
McEliece, R.J.2
van Tilborg, H.C.A.3
-
6
-
-
56749100757
-
List Decoding for Binary Goppa Codes
-
Technical report
-
Bernstein, D.J.: List Decoding for Binary Goppa Codes. Technical report (2008), http://cr.yp.to/codes/goppalist-20081107.pdf
-
(2008)
-
-
Bernstein, D.J.1
-
8
-
-
56749164782
-
Attacking and Defending theMcEliece Cryptosystem
-
Buchmann, J, Ding, J, eds, PQCrypto 2008, Springer, Heidelberg
-
Bernstein, D.J., Lange, T., Peters, C.: Attacking and Defending theMcEliece Cryptosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5299
, pp. 31-46
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
9
-
-
70350581536
-
-
Beuchat, J.-L., Sendrier, N., Tisserand, A., Villard, G.: FPGA Implementation of a Recently Published Signature Scheme. Technical report, INRIA - Institut National de Recherche en Informatique et en Automatique (2004), http://hal.archives-ouvertes.fr/docs/00/07/70/45/PDF/RR-5158.pdf
-
Beuchat, J.-L., Sendrier, N., Tisserand, A., Villard, G.: FPGA Implementation of a Recently Published Signature Scheme. Technical report, INRIA - Institut National de Recherche en Informatique et en Automatique (2004), http://hal.archives-ouvertes.fr/docs/00/07/70/45/PDF/RR-5158.pdf
-
-
-
-
11
-
-
51049092298
-
-
Bogdanov, A., Eisenbarth, T., Rupp, A., Wolf, C.: Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves? In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, 5154, pp. 45-61. Springer, Heidelberg (2008)
-
Bogdanov, A., Eisenbarth, T., Rupp, A., Wolf, C.: Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves? In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 45-61. Springer, Heidelberg (2008)
-
-
-
-
12
-
-
35248899532
-
-
Chari, S., Rao, J.R., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, 2523, pp. 13-28. Springer, Heidelberg (2003)
-
Chari, S., Rao, J.R., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13-28. Springer, Heidelberg (2003)
-
-
-
-
13
-
-
56749092208
-
Comparison of Innovative Signature Algorithms for WSNs
-
ACM, New York
-
Driessen, B., Poschmann, A., Paar, C.: Comparison of Innovative Signature Algorithms for WSNs. In: Proceedings of ACM WiSec 2008. ACM, New York (2008)
-
(2008)
Proceedings of ACM WiSec
-
-
Driessen, B.1
Poschmann, A.2
Paar, C.3
-
16
-
-
84859465967
-
Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem
-
Güneysu, T., Paar, C., Pelzl, J.: Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem. ACM Transactions on Reconfigurable Technology and Systems (TRETS) 1(2), 1-21 (2008)
-
(2008)
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
, vol.1
, Issue.2
, pp. 1-21
-
-
Güneysu, T.1
Paar, C.2
Pelzl, J.3
-
17
-
-
70350592745
-
-
Gura, N., Patel, A.,Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 925-943. Springer, Heidelberg (2004)
-
Gura, N., Patel, A.,Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 925-943. Springer, Heidelberg (2004)
-
-
-
-
18
-
-
77956272749
-
-
Helion Technology Inc. Modular Exponentiation Core Family for Xilinx FPGA, October
-
Helion Technology Inc. Modular Exponentiation Core Family for Xilinx FPGA. Data Sheet (October 2008), http://www.heliontech.com/downloads/modexp- xilinx-datasheet.pdf
-
(2008)
Data Sheet
-
-
-
19
-
-
0029755739
-
Note on decoding binary Goppa codes
-
Huber, K.: Note on decoding binary Goppa codes. Electronics Letters 32, 102-103 (1996)
-
(1996)
Electronics Letters
, vol.32
, pp. 102-103
-
-
Huber, K.1
-
20
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
21
-
-
84890863577
-
-
Springer, Heidelberg
-
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smartcards. Springer, Heidelberg (2007)
-
(2007)
Power Analysis Attacks: Revealing the Secrets of Smartcards
-
-
Mangard, S.1
Oswald, E.2
Popp, T.3
-
22
-
-
70350592744
-
-
McEliece, R.J.: A Public-Key Cryptosystem Based On Algebraic Coding Theory. Deep Space Network Progress Report 44, 114-116 (1978)
-
McEliece, R.J.: A Public-Key Cryptosystem Based On Algebraic Coding Theory. Deep Space Network Progress Report 44, 114-116 (1978)
-
-
-
-
23
-
-
84944878354
-
-
CRC Press, New York
-
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, New York (1996)
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
van Oorschot, P.C.2
Vanstone, S.A.3
-
25
-
-
38149011465
-
A Software Implementation of the McEliece Public-Key Cryptosystem
-
Springer, Heidelberg
-
Preneel, B., Bosselaers, A., Govaerts, R., Vandewalle, J.: A Software Implementation of the McEliece Public-Key Cryptosystem. In: Proceedings of the 13th Symposium on Information Theory in the Benelux, Werkgemeenschap voor Informatie en Communicatietheorie, pp. 119-126. Springer, Heidelberg (1992)
-
(1992)
Proceedings of the 13th Symposium on Information Theory in the Benelux, Werkgemeenschap voor Informatie en Communicatietheorie
, pp. 119-126
-
-
Preneel, B.1
Bosselaers, A.2
Govaerts, R.3
Vandewalle, J.4
-
27
-
-
70350581538
-
Security Solutions Using Spartan-3 Generation FPGAs
-
April 2008
-
Smerdon, M.: Security Solutions Using Spartan-3 Generation FPGAs. Whitepaper (April 2008), http://www.xilinx.com/support/documentation/white- papers/wp266.pdf
-
Whitepaper
-
-
Smerdon, M.1
-
28
-
-
56749169082
-
Side Channels in the McEliece PKC
-
Buchmann, J, Ding, J, eds, PQCrypto 2008, Springer, Heidelberg
-
Strenzke, F., Tews, E., Molter, H., Overbeck, R., Shoufan, A.: Side Channels in the McEliece PKC. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 216-229. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5299
, pp. 216-229
-
-
Strenzke, F.1
Tews, E.2
Molter, H.3
Overbeck, R.4
Shoufan, A.5
-
29
-
-
0016434152
-
A Method for Solving Key Equation for Decoding Goppa Codes
-
Sugiyama, Y., Kasahara, M., Hirasawa, S., Namekawa, T.: A Method for Solving Key Equation for Decoding Goppa Codes. IEEE Transactions on Information and Control 27, 87-99 (1975)
-
(1975)
IEEE Transactions on Information and Control
, vol.27
, pp. 87-99
-
-
Sugiyama, Y.1
Kasahara, M.2
Hirasawa, S.3
Namekawa, T.4
|