Differential Power Analysis of a McEliece Cryptosystem [PDF]
This work presents the first differential power analysis of an implementation of the McEliece cryptosystem. Target of this side-channel attack is a state-of-the-art FPGA implementation of the efficient QC-MDPC McEliece decryption operation as presented at DATE 2014.
Chen, Cong +3 more
openaire +1 more source
Post-Quantum Authentication Framework Based on Iris Recognition and Homomorphic Encryption
This paper proposes an authentication protocol based on post-quantum cryptography and iris recognition. The process uses a modified version of the original McEliece cryptographic algorithm that provides post-quantum security.
Mariano Lopez-Garcia +1 more
doaj +1 more source
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]
Farooq S +6 more
europepmc +1 more source
A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture. [PDF]
Lee J, Kim W, Kim JH.
europepmc +1 more source
Public-Key Cryptosystems and Bounded Distance Decoding of Linear Codes. [PDF]
Çalkavur S.
europepmc +1 more source
Punctured Reed–Muller code‐based McEliece cryptosystems
The authors propose new McEliece cryptosystems based on punctured Reed–Muller (RM) codes. They successfully show that the commonly known attacks, such as the Minder–Shokrollahi attack, the Chizhov–Borodin attack, and the square code attack, are ineffective against the proposed RM code‐based McEliece cryptosystem.
Wijik Lee +2 more
openaire +1 more source
A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications. [PDF]
Septien-Hernandez JA +3 more
europepmc +1 more source
This paper presents a scheme that is designed for the effective implementation of lattice reduction for polynomial matrices within the list-decoding algorithm that is applied to the binary Goppa codes.
Ki-Soon Yu, Dae-Woon Lim
doaj +1 more source
Sloppy Alice attacks! Adaptive chosen ciphertext attacks on the McEliece Public-Key Cryptosystem [PDF]
Eric R. Verheul +2 more
openalex +1 more source
McEliece Cryptosystem Based On Extended Golay Code
7
Bhatia, Amandeep Singh, Kumar, Ajay
openaire +2 more sources

