메뉴 건너뛰기




Volumn 59, Issue 11, 2010, Pages 1533-1546

A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem

Author keywords

Cryptography hardware and implementation; cryptoprocessor; FPGA; Goppa code; McEliece cryptosystem

Indexed keywords


EID: 85008529836     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2010.115     Document Type: Article
Times cited : (31)

References (30)
  • 1
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM, vol. 21, pp. 120–126, 1978.
    • (1978) Comm. ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 2
    • 0000112683 scopus 로고
    • Elleptic Curve Cryptosystems
    • N. Koblitz “Elleptic Curve Cryptosystems,” Math. Computation, vol. 48, pp. 203–209, 1987.
    • (1987) Math. Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 3
    • 33749376484 scopus 로고    scopus 로고
    • Hardware Elliptic Curve Cryptographic Processor over rmGF(p)
    • Sept.
    • C. McIvor, M. McLoone, and J. McCanny, “Hardware Elliptic Curve Cryptographic Processor over rmGF(p),” IEEE Trans. Circuits and Systems (ITCAS), vol. 53, no. 9, pp. 1946–1957, Sept. 2006.
    • (2006) IEEE Trans. Circuits and Systems (ITCAS) , vol.53 , Issue.9 , pp. 1946-1957
    • McIvor, C.1    McLoone, M.2    McCanny, J.3
  • 4
    • 0034428671 scopus 로고    scopus 로고
    • FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
    • M. Hani, T. Lin, and N. Shaikh-Husin, “FPGA Implementation of RSA Public-Key Cryptographic Coprocessor,” Proc. TENCON, pp. 6–11, 2000.
    • (2000) Proc. TENCON , pp. 6-11
    • Hani, M.1    Lin, T.2    Shaikh-Husin, N.3
  • 7
    • 0003777826 scopus 로고
    • A Public Key Cryptosystem Based on Algebraic Coding Theory
    • DSN Progress Report 42–44
    • R.J. McEliece, “A Public Key Cryptosystem Based on Algebraic Coding Theory,” DSN Progress Report 42–44, pp. 114–116, 1978.
    • (1978) , pp. 114-116
    • McEliece, R.J.1
  • 8
    • 34250244723 scopus 로고
    • Factoring Polynomials with Rational Coefficients
    • A. Lenstra, H.W. Lenstra, and L. Lovasz “Factoring Polynomials with Rational Coefficients,” Annals of Math., vol. 261, pp. 515–534, 1982.
    • (1982) Annals of Math. , vol.261 , pp. 515-534
    • Lenstra, A.1    Lenstra, H.W.2    Lovasz, L.3
  • 9
    • 71049170879 scopus 로고
    • Analysis of a Public Key Approach Based on Polynomial Substitution
    • Springer
    • H. Fell and W. Diffie, “Analysis of a Public Key Approach Based on Polynomial Substitution,” Advances in Cryptology-CRYPTO'85, Springer, 1986.
    • (1986) Advances in Cryptology-CRYPTO'85
    • Fell, H.1    Diffie, W.2
  • 10
    • 62349136105 scopus 로고    scopus 로고
    • A Novel Rekeying Message Authentication Procedure Based on Winternitz OTS and Reconfigurable Hardware Architectures
    • (ReConFig '08)
    • A. Shoufan, O. Kelm, and S. Schipp, “A Novel Rekeying Message Authentication Procedure Based on Winternitz OTS and Reconfigurable Hardware Architectures,” Proc. Int'l Conf. Reconfigurable Computing and FPGAs (ReConFig '08), 2008.
    • (2008) Proc. Int'l Conf. Reconfigurable Computing and FPGAs
    • Shoufan, A.1    Kelm, O.2    Schipp, S.3
  • 16
    • 0001618196 scopus 로고
    • A New Class of Linear Correcting Codes
    • V.D. Goppa “A New Class of Linear Correcting Codes,” Problems of Information Transmission, vol. 6, pp. 207–212, 1970.
    • (1970) Problems of Information Transmission , vol.6 , pp. 207-212
    • Goppa, V.D.1
  • 18
    • 56749164782 scopus 로고    scopus 로고
    • Attacking and Defending the McEliece Cryptosystem
    • Springer
    • D.J. Bernstein, T. Lange, and C. Peters, “Attacking and Defending the McEliece Cryptosystem,” Post-Quantum Cryptography, pp. 31–46, Springer, 2008.
    • (2008) Post-Quantum Cryptography , pp. 31-46
    • Bernstein, D.J.1    Lange, T.2    Peters, C.3
  • 19
    • 84858691417 scopus 로고    scopus 로고
    • A Summary of McEliece-Type Cryptosystems and Their Security
    • D. Engelbert, R. Overbeck, and A. Schmidt, “A Summary of McEliece-Type Cryptosystems and Their Security,” Math. Cryptology, vol. 1, pp. 151–191, 2007.
    • (2007) Math. Cryptology , vol.1 , pp. 151-191
    • Engelbert, D.1    Overbeck, R.2    Schmidt, A.3
  • 21
    • 84937393537 scopus 로고    scopus 로고
    • Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC
    • Springer
    • K. Kobara and H. Imai, “Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC,” Lecture Notes in Computer Science, pp. 19–35, Springer, 2001.
    • (2001) Lecture Notes in Computer Science , pp. 19-35
    • Kobara, K.1    Imai, H.2
  • 22
    • 0016487667 scopus 로고
    • Algebraic Decoding of Goppa Codes
    • Mar.
    • N. Patterson “Algebraic Decoding of Goppa Codes,” IEEE Trans. Information Theory, vol. 21, no. 2, pp. 203–207, Mar. 1975.
    • (1975) IEEE Trans. Information Theory , vol.21 , Issue.2 , pp. 203-207
    • Patterson, N.1
  • 24
    • 0024733862 scopus 로고
    • Systolic Gaussian Elimination over GF(p) with Partial Pivoting
    • Sept.
    • B. Hochet, P. Quinton, and Y. Robert “Systolic Gaussian Elimination over GF(p) with Partial Pivoting,” IEEE Trans. Computers, vol. 38, no. 9, pp. 1321–1324, Sept. 1989.
    • (1989) IEEE Trans. Computers , vol.38 , Issue.9 , pp. 1321-1324
    • Hochet, B.1    Quinton, P.2    Robert, Y.3
  • 28
    • 85008553313 scopus 로고    scopus 로고
    • http://www.alpha-data.com
    • “Alpha-Data,” http://www.alpha-data.com, 2010.
    • (2010) Alpha-Data
  • 29
    • 85008532562 scopus 로고    scopus 로고
    • http://www.xilinx.com
    • “Xilinx,” http://www.xilinx.com, 2010.
    • (2010) Xilinx


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.