FPGA-based key generator for the Niederreiter cryptosystem using binary Goppa codes

W Wang, J Szefer, R Niederhagen - International Conference on …, 2017 - Springer
This paper presents a post-quantum secure, efficient, and tunable FPGA implementation of
the key-generation algorithm for the Niederreiter cryptosystem using binary Goppa codes …

A fault attack on the Niederreiter cryptosystem using binary irreducible Goppa codes

J Danner, M Kreuzer - journal of Groups, complexity, cryptology, 2020 - gcc.episciences.org
A fault injection framework for the decryption algorithm of the Niederreiter public-key
cryptosystem using binary irreducible Goppa codes and classical decoding techniques is …

Efficient ASIC Architecture for Low Latency Classic McEliece Decoding

D Fallnich, C Lanius, S Zhang… - IACR Transactions on …, 2024 - tches.iacr.org
Post-quantum cryptography addresses the increasing threat that quantum computing poses
to modern communication systems. Among the available “quantum-resistant” systems, the …

Leveraging HLS to Design a Versatile & High-Performance Classic McEliece Accelerator

IV Kostalabros, J Ribes, X Carril, O Farras… - ACM Transactions on …, 2024 - dl.acm.org
By harnessing fundamental quantum properties, a large-scale quantum computer could
undermine currently deployed public-key algorithms. The post-quantum, code-based …

Efficient ASIC Architectures for Low Latency Niederreiter Decryption

D Fallnich, S Zhang, T Gemmeke - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Post-quantum cryptography addresses the increasing threat that quantum computing poses
to modern communication systems. Among the available" quantum-resistant" systems, the …

Implantation sécurisée de protocoles cryptographiques basés sur les codes correcteurs d'erreurs

T Richmond - 2016 - theses.hal.science
Le premier protocole cryptographique basé sur les codes correcteurs d'erreurs a été
proposé en 1978 par Robert McEliece. La cryptographie basée sur les codes est dite post …

Post-Quantum Cryptosystem of Niederreiter, Algorithm and Encryption Scheme: Modification and Optimization

P Sharifov, Z Kiyashova, D Belchikova… - … Industry, Volume 1, 2021 - Springer
The article discusses issues related to the post-quantum public key cryptosystem based on
algebraic coding—the Niederreiter cryptographic system. Comparison of this cryptosystem …

A New Approximation Method for Constant Weight Coding and Its Hardware Implementation

J Hu, RCC Cheung - Recent Advances in Cryptography and …, 2018 - books.google.com
In this chapter, a more memory-efficient method for encoding binary information into words
of prescribed length and weight is presented. The solutions in existing work include complex …