메뉴 건너뛰기




Volumn 6061 LNCS, Issue , 2010, Pages 165-181

Low-Reiter: Niederreiter encryption scheme for embedded microcontrollers

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOSYSTEMS; DISCRETE LOGARITHM PROBLEMS; EFFICIENT IMPLEMENTATION; EMBEDDED MICROCONTROLLER; ENCRYPTION AND DECRYPTION; ENCRYPTION SCHEMES; LINEAR BINARY CODE; MCELIECE; NP COMPLETE; PUBLIC KEYS;

EID: 77954404107     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-12929-2_13     Document Type: Conference Paper
Times cited : (20)

References (34)
  • 3
    • 56749100757 scopus 로고    scopus 로고
    • Technical report, University of Illinois at Chicago
    • Bernstein, D.J.: List decoding for binary codes. Technical report, University of Illinois at Chicago (2008), http://cr.yp.to/codes/goppalist- 20081107.pdf
    • (2008) List Decoding for Binary Codes
    • Bernstein, D.J.1
  • 5
    • 56749164782 scopus 로고    scopus 로고
    • Attacking and Defending theMcEliece Cryptosystem
    • Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
    • Bernstein, D.J., Lange, T., Peters, C.: Attacking and Defending theMcEliece Cryptosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008), http://eprint.iacr.org/2008/ 318
    • (2008) LNCS , vol.5299 , pp. 31-46
    • Bernstein, D.J.1    Lange, T.2    Peters, C.3
  • 6
    • 84872730929 scopus 로고    scopus 로고
    • Efficient Root Finding of Polynomials over Fields of Characteristic 2
    • WEWoRC 2009. Springer, Heidelberg, to appear
    • Biswas, B., Herbert, V.: Efficient Root Finding of Polynomials over Fields of Characteristic 2. In: WEWoRC 2009. LNCS. Springer, Heidelberg (2009) (to appear)
    • (2009) LNCS
    • Biswas, B.1    Herbert, V.2
  • 8
    • 35248899532 scopus 로고    scopus 로고
    • Template Attacks
    • Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg
    • Chari, S., Rao, J.R., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13-28. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2523 , pp. 13-28
    • Chari, S.1    Rao, J.R.2    Rohatgi, P.3
  • 9
    • 5244282087 scopus 로고
    • Cyclic decoding procedure for the bose-chaudhuri-hocquenghem codes
    • Chien, R.T.: Cyclic decoding procedure for the bose-chaudhuri-hocquenghem codes. IEEE Trans. Information Theory IT-10(10), 357-363 (1964)
    • (1964) IEEE Trans. Information Theory , vol.10 IT-10 , pp. 357-363
    • Chien, R.T.1
  • 13
    • 67650318950 scopus 로고    scopus 로고
    • Technical report, D.SPA.28 Rev. 1.1, July
    • ECRYPT. Yearly report on algorithms and keysizes (2007-2008). Technical report, D.SPA.28 Rev. 1.1 (July 2008), http://www.ecrypt.eu.org/documents/D.SPA. 10-1.1.pdf
    • (2008) Yearly Report on Algorithms and Keysizes (2007-2008)
  • 14
    • 70350591229 scopus 로고    scopus 로고
    • MicroEliece: McEliece for Embedded Devices
    • Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
    • Eisenbarth, T., Gneysu, T., Heyse, S., Paar, C.: MicroEliece: McEliece for Embedded Devices. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 49-64. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5747 , pp. 49-64
    • Eisenbarth, T.1    Gneysu, T.2    Heyse, S.3    Paar, C.4
  • 15
    • 84947905764 scopus 로고    scopus 로고
    • An Efficient Pseudo-Random Generator Provably As Secure As Syndrome Decoding
    • Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
    • Fischer, J.-B., Stern, J.: An Efficient Pseudo-Random Generator Provably As Secure As Syndrome Decoding. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 245-255. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1070 , pp. 245-255
    • Fischer, J.-B.1    Stern, J.2
  • 16
    • 77954416429 scopus 로고    scopus 로고
    • and Entropy, s, http://entropy.stop1984.com
    • Freenet and Entropy. Open-source p2p network applications (2009), s http://freenetproject.org, http://entropy.stop1984.com
    • (2009) Open-source P2p Network Applications
  • 17
    • 35048818581 scopus 로고    scopus 로고
    • Comparing elliptic curve cryptography and rsa on 8-bit cpus
    • Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
    • Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and rsa on 8-bit cpus. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119-132. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3156 , pp. 119-132
    • Gura, N.1    Patel, A.2    Wander, A.3    Eberle, H.4    Shantz, S.C.5
  • 18
    • 0010651267 scopus 로고
    • A new method of solving numerical equations of all orders, by continuous approximation
    • Horner, W.G.: A new method of solving numerical equations of all orders, by continuous approximation. Philosophical Transactions of the Royal Society of London, 308-335 (1819)
    • (1819) Philosophical Transactions of the Royal Society of London , pp. 308-335
    • Horner, W.G.1
  • 19
    • 0029755739 scopus 로고    scopus 로고
    • Note on decoding binary goppa codes
    • Huber, K.: Note on decoding binary goppa codes. Electronics Letters 32, 102-103 (1996)
    • (1996) Electronics Letters , vol.32 , pp. 102-103
    • Huber, K.1
  • 20
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
    • Kocher, P.C.: Timing Attacks On Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 22
    • 0002448405 scopus 로고
    • A public-key cryptosystem based on algebraic coding theory
    • McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Deep Space Network Progress Report 44, 114-116 (1978)
    • (1978) Deep Space Network Progress Report , vol.44 , pp. 114-116
    • McEliece, R.J.1
  • 28
    • 84455184676 scopus 로고
    • Efficient generation of binary words of given weight
    • Boyd, C. (ed.) Cryptography and Coding 1995. Springer, Heidelberg
    • Sendrier, N.: Efficient generation of binary words of given weight. In: Boyd, C. (ed.) Cryptography and Coding 1995. LNCS, vol. 1025, pp. 184-187. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.1025 , pp. 184-187
    • Sendrier, N.1
  • 30
    • 56749169082 scopus 로고    scopus 로고
    • Side Channels in the McEliece PKC
    • Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
    • Strenzke, F., Tews, E., Molter, H., Overbeck, R., Shoufan, A.: Side Channels in the McEliece PKC. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 216-229. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5299 , pp. 216-229
    • Strenzke, F.1    Tews, E.2    Molter, H.3    Overbeck, R.4    Shoufan, A.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.