搜索结果: 1-8 共查到“军事学 Code-based cryptosystems”相关记录8条 . 查询时间(0.08 秒)
A toolbox for software optimization of QC-MDPC code-based cryptosystems
Code-based cryptosystems MDPC
2018/1/2
The anticipated emergence of quantum computers in the foreseeable future drives the cryptographic community to start considering cryptosystems, which are based on problems that remain intractable even...
Fast and Secure Root Finding for Code-based Cryptosystems
implementation side channel attack timing attack implementation
2012/6/14
In this work we analyze four previously published respectively trivial approaches to the task of finding the roots of the error locator polynomial during the decryption operation of code-based encrypt...
Timing Attacks against the Syndrome Inversionin Code-based Cryptosystems
fstrenzke at crypto-source de
2012/6/14
In this work we present new timing vulnerabilities that arise in the inversion of the error syndrome through the Extended Euclidean Algorithm that is part of the decryption operation of code-based Cry...
Timing Attacks against the Syndrome Inversionin Code-based Cryptosystems
implementation / ide channel attack timing attack post quantum crypto-graphy code-based cryptography
2012/3/20
In this work we present new timing vulnerabilities that arise in the inversion of the error syndrome through the Extended Euclidean Algorithm that is part of the decryption operation of code-based Cry...
Fast and Secure Root-Finding for Code-based Cryptosystems
implementation / side channel attack timing attack implementation code-based cryptography
2012/3/20
In this work we analyze four previously published respec- tively trivial approaches to the task of finding the roots of the error locator polynomial during the decryption operation of code-based en- c...
Fast and Secure Root Finding for Code-based Cryptosystems
side channel attack timing attack implementation
2012/8/28
In this work we analyze five previously published respectively trivial approaches and two new hybrid variants for the task of finding the roots of the error locator polynomial during the decryption op...
Timing Attacks against the Syndrome Inversion in Code-based Cryptosystems
ide channel attack timing attack post quantum crypto-graphy
2012/8/28
In this work we present the first practical key-aimed timing attack against code-based cryptosystems. It arises from vulnerabilities that are present in the inversion of the error syndrome through the...
Security Bounds for the Design of Code-based Cryptosystems
computational syndrome decoding information set decoding generalized birthday algorithm
2009/9/2
Code-based cryptography is often viewed as an interesting
"Post-Quantum" alternative to the classical number theory cryptogra-
phy. Unlike many other such alternatives, it has the convenient advan-
...