Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA
暂无分享,去创建一个
[1] Radinka Yorgova,et al. On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight , 2023, IEEE Access.
[2] Reza Azarderakhsh,et al. Hardware Constructions for Lightweight Cryptographic Block Cipher QARMA With Error Detection Mechanisms , 2020, IEEE Transactions on Emerging Topics in Computing.
[3] Reza Azarderakhsh,et al. CRC-Based Error Detection Constructions for FLT and ITA Finite Field Inversions Over GF(2m) , 2021, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[4] Reza Azarderakhsh,et al. Reliable Architectures for Composite-Field-Oriented Constructions of McEliece Post-Quantum Cryptography on FPGA , 2021, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[5] Reza Azarderakhsh,et al. Fault Detection Architectures for Inverted Binary Ring-LWE Construction Benchmarked on FPGA , 2021, IEEE Transactions on Circuits and Systems II: Express Briefs.
[6] Reza Azarderakhsh,et al. Reliable CRC-Based Error Detection Constructions for Finite Field Multipliers With Applications in Cryptography , 2021, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[7] Ming-Shing Chen,et al. Classic McEliece on the ARM Cortex-M4 , 2021, IACR Cryptol. ePrint Arch..
[8] Lilian Bossuet,et al. Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem , 2021, EUROCRYPT.
[9] Lake Bu,et al. Quantum-Proof Lightweight McEliece Cryptosystem Co-processor Design , 2020, 2020 IEEE 38th International Conference on Computer Design (ICCD).
[10] Mariano Lopez-Garcia,et al. Hardware-Software Implementation of a McEliece Cryptosystem for Post-quantum Cryptography , 2020 .
[11] R. Azarderakhsh,et al. Error Detection Architectures for Ring Polynomial Multiplication and Modular Reduction of Ring-LWE in Z /p Z [ x ] x n +1 Benchmarked on ASIC , 2020 .
[12] E. Karatsiolis,et al. Classic McEliece Implementation with Low Memory Footprint , 2020, CARDIS.
[13] Reza Azarderakhsh,et al. Reliable Architecture-Oblivious Error Detection Schemes for Secure Cryptographic GCM Structures , 2019, IEEE Transactions on Reliability.
[14] Zhe Li,et al. Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations , 2019, Public Key Cryptography.
[15] Reza Azarderakhsh,et al. Efficient and Reliable Error Detection Architectures of Hash-Counter-Hash Tweakable Enciphering Schemes , 2018, ACM Trans. Embed. Comput. Syst..
[16] Reza Azarderakhsh,et al. Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[17] Daniel J. Bernstein,et al. conservative code-based cryptography , 2017 .
[18] Ravi S. Sandhu,et al. Fingerprint-Based Detection and Diagnosis of Malicious Programs in Hardware , 2015, IEEE Transactions on Reliability.
[19] Reza Azarderakhsh,et al. Reliable and Error Detection Architectures of Pomaranch for False-Alarm-Sensitive Cryptographic Applications , 2015, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[20] Arash Reyhani-Masoleh,et al. Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm , 2014, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[21] Reza Azarderakhsh,et al. Reliable Concurrent Error Detection Architectures for Extended Euclidean-Based Division Over ${\rm GF}(2^{m})$ , 2014, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[22] Falko Strenzke,et al. Efficiency and implementation security of code-based cryptosystems , 2013 .
[23] Arash Reyhani-Masoleh,et al. A High-Performance Fault Diagnosis Approach for the AES SubBytes Utilizing Mixed Bases , 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[24] Abdulhadi Shoufan,et al. A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem , 2010, IEEE Transactions on Computers.
[25] Jagdish Chandra Patra,et al. Concurrent Error Detection in Bit-Serial Normal Basis Multiplication Over ${\rm GF}(2^{m})$ Using Multiple Parity Prediction Schemes , 2010, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[26] Pierre-Louis Cayrel,et al. McEliece/Niederreiter PKC: Sensitivity to Fault Injection , 2010, 2010 5th International Conference on Future Information Technology.
[27] Arash Reyhani-Masoleh,et al. Fault Detection Structures of the S-boxes and the Inverse S-boxes for the Advanced Encryption Standard , 2009, J. Electron. Test..
[28] Arash Reyhani-Masoleh,et al. A low-cost S-box for the Advanced Encryption Standard using normal basis , 2009, 2009 IEEE International Conference on Electro/Information Technology.
[29] Erik Tews,et al. Side Channels in the McEliece PKC , 2008, PQCrypto.
[30] Francisco Rodríguez-Henríquez,et al. A fast implementation of multiplicative inversion over GF(2/sup m/) , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[31] M. Anwar Hasan,et al. Error Detection in Polynomial Basis Multipliers over Binary Extension Fields , 2002, CHES.
[32] Christof Paar,et al. Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes , 2002, Des. Codes Cryptogr..
[33] T. Itoh,et al. A Fast Algorithm for Computing Multiplicative Inverses in GF(2^m) Using Normal Bases , 1988, Inf. Comput..
[34] Nicholas J. Patterson,et al. The algebraic decoding of Goppa codes , 1975, IEEE Trans. Inf. Theory.