Results 61 to 70 of about 124 (115)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Classic McEliece Implementation with Low Memory Footprint
2021The Classic McEliece cryptosystem is one of the most trusted quantum-resistant cryptographic schemes. Deploying it in practical applications, however, is challenging due to the size of its public key. In this work, we bridge this gap. We present an implementation of Classic McEliece on an ARM Cortex-M4 processor, optimized to overcome memory ...
Johannes Roth +2 more
openaire +1 more source
iMACE: In-Memory Acceleration of Classic McEliece Encoder
2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2019Asymmetric code-based crypto-systems have been developed in the last decade due to rapid evolution of quantum computing that can potentially compromise RSA and ECC based crypto-systems. The McEliece crypto-system based on the general decoding problem is one of the front runner candidates for post-quantum cryptography but the energy-efficiency is ...
Karthikeyan Nagarajan +4 more
openaire +1 more source
Exploring the RISC-V Vector Extension for the Classic McEliece Post-Quantum Cryptosystem
2021 22nd International Symposium on Quality Electronic Design (ISQED), 2021The dawn of quantum computers threatens the security guarantees of classical public-key cryptography. This gave rise to a new class of so-called quantum-resistant cryptography algorithms and a need to efficiently implement them on embedded hardware platforms. This paper investigates how we can exploit the most recent RISC-V Vector Extension Version 0.9
S. Pircher +3 more
openaire +1 more source
Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem
2021Code-based public-key cryptosystems are promising candidates for standardization as quantum-resistant public-key cryptographic algorithms. Their security is based on the hardness of the syndrome decoding problem. Computing the syndrome in a finite field, usually \(\mathbb {F}_{2}\), guarantees the security of the constructions.
Pierre-Louis Cayrel +4 more
openaire +1 more source
2017
The first code-based public-key cryptosystem was introduced in 1978 by McEliece. The public key specifies a random binary Goppa code. A ciphertext is a codeword plus random errors. The private key allows efficient decoding: extracting the codeword from the ciphertext, identifying and removing the errors.The McEliece system was designed to be one-way ...
Bernstein, Daniel J. +11 more
openaire +1 more source
The first code-based public-key cryptosystem was introduced in 1978 by McEliece. The public key specifies a random binary Goppa code. A ciphertext is a codeword plus random errors. The private key allows efficient decoding: extracting the codeword from the ciphertext, identifying and removing the errors.The McEliece system was designed to be one-way ...
Bernstein, Daniel J. +11 more
openaire +1 more source
Efficient Decryption Architecture for Classic McEliece
2023 24th International Symposium on Quality Electronic Design (ISQED), 2023Xinyuan Qiao +3 more
openaire +1 more source
Quantum Implementation of Core Operations in Classic McEliece
2023 International Conference on Platform Technology and Service (PlatCon), 2023Yujin Oh +4 more
openaire +1 more source
Performance Evaluation of Classic McEliece Post Quantum Cryptography
2022 Algorithms, Computing and Mathematics Conference (ACM), 2022Lingeshwaran B, Avtar Singh
openaire +1 more source
POSTKVANT KRIPTOGRAFIYASI CRYSTALS KYBER VA CLASSIC MCELIECE ALGORITMLARINING TAHLILI
Ushbu maqolada postkvant kriptografiya sohasi, kvant hisoblash texnologiyalari tomonidan an'anaviy kriptografik tizimlarga bo'ladigan tahdidlar va postkvant kriptografiyasining ilk ko'rinishlarining tahlil qilingan. Ishda Crystals Kyber va Classic McEliece algoritmlari misolida postkvant shifrlashning matematik asoslari, ularning amalda qo'llanilishi,openaire +1 more source

