-
2
-
-
56749164782
-
Attacking and Defending theMcEliece Cryptosystem
-
Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
-
Bernstein, D.J., Lange, T., Peters, C.: Attacking and Defending theMcEliece Cryptosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008), http://eprint.iacr.org/2008/ 318
-
(2008)
LNCS
, vol.5299
, pp. 31-46
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
3
-
-
56749156338
-
McEliece Cryptosystem Implementation: Theory and Practice
-
Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
-
Biswas, B., Sendrier, N.: McEliece Cryptosystem Implementation: Theory and Practice. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 47-62. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5299
, pp. 47-62
-
-
Biswas, B.1
Sendrier, N.2
-
4
-
-
58549114936
-
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection
-
Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. Springer, Heidelberg
-
Bogdanov, A., Kizhvatov, I., Pyshkin, A.: Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 251-265. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5365
, pp. 251-265
-
-
Bogdanov, A.1
Kizhvatov, I.2
Pyshkin, A.3
-
5
-
-
35048818034
-
Correlation Power Analysis with a Leakage Model
-
Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
-
Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3156
, pp. 16-29
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
7
-
-
35248838910
-
A DPA Attack against the Modular Reduction within a CRT Implementation of RSA
-
Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg
-
den Boer, B., Lemke, K., Wicke, G.: A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 228-243. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2523
, pp. 228-243
-
-
Den Boer, B.1
Lemke, K.2
Wicke, G.3
-
8
-
-
70350591229
-
MicroEliece: McEliece for Embedded Devices
-
Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
-
Eisenbarth, T., Güneysu, T., Heyse, S., Paar, C.: MicroEliece: McEliece for Embedded Devices. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 49-64. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5747
, pp. 49-64
-
-
Eisenbarth, T.1
Güneysu, T.2
Heyse, S.3
Paar, C.4
-
9
-
-
51849131973
-
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.T.M.: On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 203-220. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 203-220
-
-
Eisenbarth, T.1
Kasper, T.2
Moradi, A.3
Paar, C.4
Salmasizadeh, M.5
Shalmani, M.T.M.6
-
10
-
-
84858691417
-
A Summary of McEliece-Type Cryptosystems and their Security
-
Engelbert, D., Overbeck, R., Schmidt, A.: A Summary of McEliece-Type Cryptosystems and their Security. Journal of Mathematical Cryptology 1(2), 151-199 (2006), http://eprint.iacr.org/2006/162
-
(2006)
Journal of Mathematical Cryptology
, vol.1
, Issue.2
, pp. 151-199
-
-
Engelbert, D.1
Overbeck, R.2
Schmidt, A.3
-
11
-
-
51049117070
-
Mutual Information Analysis
-
Oswald, E., Rohatgi, P. (eds.) CHES 2008. Springer, Heidelberg
-
Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual Information Analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426-442. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5154
, pp. 426-442
-
-
Gierlichs, B.1
Batina, L.2
Tuyls, P.3
Preneel, B.4
-
14
-
-
70350678744
-
Breaking KeeLoq in a Flash
-
Preneel, B. (ed.) AFRICACRYPT 2009. Springer, Heidelberg
-
Kasper, M., Kasper, T., Moradi, A., Paar, C.: Breaking KeeLoq in a Flash. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 403-420. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5580
, pp. 403-420
-
-
Kasper, M.1
Kasper, T.2
Moradi, A.3
Paar, C.4
-
15
-
-
84939573910
-
Differential Power Analysis
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
16
-
-
85034651324
-
An Observation on the Security of McEliece's Public-Key Cryptosystem
-
Günther, C.G. (ed.) EUROCRYPT 1988. Springer, Heidelberg
-
Lee, P.J., Brickell, E.F.: An Observation on the Security of McEliece's Public-Key Cryptosystem. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 275-280. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.330
, pp. 275-280
-
-
Lee, P.J.1
Brickell, E.F.2
-
17
-
-
0024078914
-
A Probabilistic Algorithm for Computing Minimum Weights of Large Error-Correcting Codes
-
Leon, J.S.: A Probabilistic Algorithm for Computing Minimum Weights of Large Error-Correcting Codes. IEEE Transactions on Information Theory 34(5), 1354-1359 (1988)
-
(1988)
IEEE Transactions on Information Theory
, vol.34
, Issue.5
, pp. 1354-1359
-
-
Leon, J.S.1
-
18
-
-
0002448405
-
A Public-Key Cryptosystem Based on Algebraic Coding Theory
-
McEliece, R.J.: A Public-Key Cryptosystem Based On Algebraic Coding Theory. Deep Space Network Progress Report 44, 114-116 (1978)
-
(1978)
Deep Space Network Progress Report
, vol.44
, pp. 114-116
-
-
McEliece, R.J.1
-
19
-
-
68549099555
-
Using Second-Order Power Analysis to Attack DPA Resistant Software
-
Paar, C., Koç, Ç.K. (eds.) CHES 2000. Springer, Heidelberg
-
Messerges, T.S.: Using Second-Order Power Analysis to Attack DPA Resistant Software. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 238-251. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1965
, pp. 238-251
-
-
Messerges, T.S.1
-
20
-
-
35248821853
-
Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems
-
Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg
-
Oswald, E.: Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 82-97. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2523
, pp. 82-97
-
-
Oswald, E.1
-
21
-
-
33745679179
-
Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers
-
Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
-
Oswald, E., Mangard, S., Herbst, C., Tillich, S.: Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 192-207. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3860
, pp. 192-207
-
-
Oswald, E.1
Mangard, S.2
Herbst, C.3
Tillich, S.4
-
23
-
-
70350576829
-
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
-
Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
-
Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N.: Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 97-111. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5747
, pp. 97-111
-
-
Renauld, M.1
Standaert, F.-X.2
Veyrat-Charvillon, N.3
-
24
-
-
35048895383
-
A Collision-Attack on AES: Combining Side Channel- and Differential-Attack
-
Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
-
Schramm, K., Leander, G., Felke, P., Paar, C.: A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 163-175. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3156
, pp. 163-175
-
-
Schramm, K.1
Leander, G.2
Felke, P.3
Paar, C.4
-
25
-
-
33745652931
-
Higher Order Masking of the AES
-
Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
-
Schramm, K., Paar, C.: Higher Order Masking of the AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 208-225. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3860
, pp. 208-225
-
-
Schramm, K.1
Paar, C.2
-
26
-
-
0242571732
-
A New Class of Collision Attacks and Its Application to des
-
Johansson, T. (ed.) FSE 2003. Springer, Heidelberg
-
Schramm, K., Wollinger, T.J., Paar, C.: A New Class of Collision Attacks and Its Application to DES. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 206-222. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2887
, pp. 206-222
-
-
Schramm, K.1
Wollinger, T.J.2
Paar, C.3
-
27
-
-
77954391699
-
A Timing Attack Against Patterson Algorithm in the McEliece PKC
-
International Conference on Information Security and Cryptology - ICISC 2009. Springer, Heidelberg to appear
-
Shoufan, A., Strenzke, F., Molter, H.G., Stoettinger, M.: A Timing Attack Against Patterson Algorithm in the McEliece PKC. In: International Conference on Information Security and Cryptology - ICISC 2009. LNCS, Springer, Heidelberg (2009) (to appear)
-
(2009)
LNCS
-
-
Shoufan, A.1
Strenzke, F.2
Molter, H.G.3
Stoettinger, M.4
-
28
-
-
71049123271
-
A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms
-
IEEE Computer Society, Los Alamitos
-
Shoufan, A., Wink, T., Molter, G., Huss, S., Strentzke, F.: A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms. In: Applicationspecific Systems, Architectures and Processors - ASAP 2009, pp. 98-105. IEEE Computer Society, Los Alamitos (2009)
-
(2009)
Applicationspecific Systems, Architectures and Processors - ASAP 2009
, pp. 98-105
-
-
Shoufan, A.1
Wink, T.2
Molter, G.3
Huss, S.4
Strentzke, F.5
-
29
-
-
85021424387
-
Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls
-
Abe, M. (ed.) CT-RSA 2007. Springer, Heidelberg
-
Silverman, J.H., Whyte, W.: Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 208-224. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4377
, pp. 208-224
-
-
Silverman, J.H.1
Whyte, W.2
-
30
-
-
31344451762
-
Power Analysis Attacks Against FPGA Implementations of the des
-
Becker, J., Platzner, M., Vernalde, S. (eds.) FPL 2004. Springer, Heidelberg
-
Standaert, F.-X., Örs, S.B., Quisquater, J.-J., Preneel, B.: Power Analysis Attacks Against FPGA Implementations of the DES. In: Becker, J., Platzner, M., Vernalde, S. (eds.) FPL 2004. LNCS, vol. 3203, pp. 84-94. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3203
, pp. 84-94
-
-
Standaert, F.-X.1
Örs, S.B.2
Quisquater, J.-J.3
Preneel, B.4
-
31
-
-
84964937021
-
A Method for Finding Codewords of Small Weight
-
Wolfmann, J., Cohen, G. (eds.) Coding Theory 1988. Springer, Heidelberg
-
Stern, J.: A Method for Finding Codewords of Small Weight. In: Wolfmann, J., Cohen, G. (eds.) Coding Theory 1988. LNCS, vol. 388, pp. 106-113. Springer, Heidelberg (1989)
-
(1989)
LNCS
, vol.388
, pp. 106-113
-
-
Stern, J.1
-
32
-
-
56749169082
-
Side Channels in the McEliece PKC
-
Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
-
Strenzke, F., Tews, E., Molter, H.G., Overbeck, R., Shoufan, A.: Side Channels in the McEliece PKC. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 216-229. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5299
, pp. 216-229
-
-
Strenzke, F.1
Tews, E.2
Molter, H.G.3
Overbeck, R.4
Shoufan, A.5
-
34
-
-
77954405821
-
-
Bachelor's thesis, Technical University of Darmstadt, Germany
-
Vizev, N.V.: Side Channel Attacks on NTRUEncrypt. Bachelor's thesis, Technical University of Darmstadt, Germany (2007), http://www.cdc.informatik.tu- darmstadt.de/reports/reports/Nikolay-Vizev.bachelor.pdf
-
(2007)
Side Channel Attacks on NTRUEncrypt
-
-
Vizev, N.V.1
|