Lightweight cryptography for embedded systems–a comparative analysis

C Manifavas, G Hatzivasilis, K Fysarakis… - … Workshop on Data …, 2013 - Springer
As computing becomes pervasive, embedded systems are deployed in a wide range of
domains, including industrial systems, critical infrastructures, private and public spaces as …

Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices

S Heyse, I Von Maurich, T Güneysu - … , Santa Barbara, CA, USA, August 20 …, 2013 - Springer
In the last years code-based cryptosystems were established as promising alternatives for
asymmetric cryptography since they base their security on well-known NP-hard problems …

FPGA-based Niederreiter cryptosystem using binary Goppa codes

W Wang, J Szefer, R Niederhagen - … 2018, Fort Lauderdale, FL, USA, April …, 2018 - Springer
This paper presents an FPGA implementation of the Niederreiter cryptosystem using binary
Goppa codes, including modules for encryption, decryption, and key generation. We …

A timing attack against Patterson algorithm in the McEliece PKC

A Shoufan, F Strenzke, HG Molter… - Information, Security and …, 2010 - Springer
The security of McEliece public-key cryptosystem is based on the difficulty of the decoding
problem which is NP-hard. In this paper we propose a timing attack on the Patterson …

Hls-based hw/sw co-design of the post-quantum classic mceliece cryptosystem

V Kostalabros, J Ribes-González… - … Conference on Field …, 2021 - ieeexplore.ieee.org
While quantum computers are rapidly becoming more powerful, the current cryptographic
infrastructure is imminently threatened. In a preventive manner, the US National Institute of …

Implementing qc-mdpc mceliece encryption

IV Maurich, T Oder, T Güneysu - ACM Transactions on Embedded …, 2015 - dl.acm.org
With respect to performance, asymmetric code-based cryptography based on binary Goppa
codes has been reported as a highly interesting alternative to RSA and ECC. A major …

FPGA-based key generator for the Niederreiter cryptosystem using binary Goppa codes

W Wang, J Szefer, R Niederhagen - International Conference on …, 2017 - Springer
This paper presents a post-quantum secure, efficient, and tunable FPGA implementation of
the key-generation algorithm for the Niederreiter cryptosystem using binary Goppa codes …

Practical power analysis attacks on software implementations of McEliece

S Heyse, A Moradi, C Paar - International Workshop on Post-Quantum …, 2010 - Springer
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear
binary codes is an NP-complete problem. The interest on implementing post-quantum …

Towards one cycle per bit asymmetric encryption: Code-based cryptography on reconfigurable hardware

S Heyse, T Güneysu - International Workshop on Cryptographic Hardware …, 2012 - Springer
Most advanced security systems rely on public-key schemes based either on the
factorization or the discrete logarithm problem. Since both problems are known to be closely …

Timing attacks against the syndrome inversion in code-based cryptosystems

F Strenzke - … : 5th International Workshop, PQCrypto 2013, Limoges …, 2013 - Springer
In this work we present the first practical key-aimed timing attack against code-based
cryptosystems. It arises from vulnerabilities that are present in the inversion of the error …