Zobrazeno 1 - 10
of 66
pro vyhledávání: '"Stefan Heyse"'
Code-based cryptography on reconfigurable hardware: tweaking Niederreiter encryption for performance
Autor:
Tim Güneysu, Stefan Heyse
Publikováno v:
Journal of Cryptographic Engineering. 3:29-43
Today’s public-key schemes that are either based on the factorization or the discrete logarithm problem. Since both problems are closely related, a major breakthrough in cryptanalysis (e.g., with the advent of quantum computing will render nearly a
Publikováno v:
Post-Quantum Cryptography ISBN: 9783319116587
PQCrypto
PQCrypto
In this work, we describe the first implementation of an information set decoding (ISD) attack against code-based cryptosystems like McEliece or Niederreiter using special-purpose hardware. We show that in contrast to other ISD attacks due to Lee and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::20568a50ed1e89a192cc9833e148c4f2
https://doi.org/10.1007/978-3-319-11659-4_8
https://doi.org/10.1007/978-3-319-11659-4_8
Publikováno v:
Cryptographic Hardware and Embedded Systems-CHES 2013 ISBN: 9783642403484
CHES
CHES
In the last years code-based cryptosystems were established as promising alternatives for asymmetric cryptography since they base their security on well-known NP-hard problems and still show decent performance on a wide range of computing platforms.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d13e7cf454febed559d4a0dc64fb63f7
https://doi.org/10.1007/978-3-642-40349-1_16
https://doi.org/10.1007/978-3-642-40349-1_16
Autor:
Thomas Eisenbarth, Zheng Gong, Tim Gxfcneysu, Stefan Heyse, Sebastiaan Indesteege, Stxe9phanie Kerckhof, Franxe7ois Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni, Franxe7ois-Xavier Standaert, Loxefc van Oldeneel tot Oldenzeel
Publikováno v:
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices.
Publikováno v:
Fast Software Encryption-19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012
Fast Software Encryption-19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012, Mar 2012, Washington DC, United States. pp.346-365, ⟨10.1007/978-3-642-34047-5_20⟩
Lecture Notes in Computer Science
Fast Software Encryption ISBN: 9783642340468
FSE
Fast Software Encryption-19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012, Mar 2012, Washington DC, United States. pp.346-365, ⟨10.1007/978-3-642-34047-5_20⟩
Lecture Notes in Computer Science
Fast Software Encryption ISBN: 9783642340468
FSE
International audience; We propose a new authentication protocol that is provably secure based on a ring variant of the learning parity with noise (LPN) problem. The protocol follows the design principle of the LPN-based protocol from Eurocrypt'11 (K
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cee2f2748bfa0eee28d6091661597988
https://hal.inria.fr/hal-00864307
https://hal.inria.fr/hal-00864307
Autor:
Tim Güneysu, Stefan Heyse
Publikováno v:
Cryptographic Hardware and Embedded Systems – CHES 2012 ISBN: 9783642330261
CHES
CHES
Most advanced security systems rely on public-key schemes based either on the factorization or the discrete logarithm problem. Since both problems are known to be closely related, a major breakthrough in cryptanalysis tackling one of those problems c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::94a9dac65d6ad5d3ef5ad99cfa1c3e86
https://doi.org/10.1007/978-3-642-33027-8_20
https://doi.org/10.1007/978-3-642-33027-8_20
Publikováno v:
Cryptographic Hardware and Embedded Systems – CHES 2012 ISBN: 9783642330261
CHES
CHES
Multivariate Quadratic Public Key Schemes (MQPKS) attracted the attention of researchers in the last decades for two reasons. First they are thought to resist attacks by quantum computers and second, most of the schemes were broken. The latter may be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ea0b58bc8334fc96b37b9e45ee9f4c7e
https://doi.org/10.1007/978-3-642-33027-8_22
https://doi.org/10.1007/978-3-642-33027-8_22
Publikováno v:
ACM Great Lakes Symposium on VLSI
Almost all of today's security systems rely on cryptographic primitives as core components which are usually considered the most trusted part of the system. The realization of these primitives on the underlying processing platform plays a crucial rol
Autor:
Stefan Heyse
Publikováno v:
Post-Quantum Cryptography ISBN: 9783642254048
PQCrypto
PQCrypto
Most public-key cryptosystems frequently implemented have been proven secure on the basis of the presumed hardness of two mathematical problems: factoring the product of two large primes (FP) and computing discrete logarithms (DLP). At present, both
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0fa630944b1f8f6ae41ffe40a1a69be3
https://doi.org/10.1007/978-3-642-25405-5_10
https://doi.org/10.1007/978-3-642-25405-5_10
Publikováno v:
Post-Quantum Cryptography ISBN: 9783642129285
PQCrypto
PQCrypto
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptographic algorithms, e.g. McEliece, on microprocessor-based platforms has be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b935286b3091fe8f65499933664f8975
https://doi.org/10.1007/978-3-642-12929-2_9
https://doi.org/10.1007/978-3-642-12929-2_9