Session 2 : Side-Channel Attacks II Recent progress in code-based cryptography Information Security and Assurance Polynomial structures in code-based cryptography New directions in cryptography. Information Theory A new class of linear correcting codes A new method of solving numerical equations of all orders, by continuous approximation, COSADE 2010 -First International Workshop on Constructive Side-Channel Analysis and Secure DesignKoc96] P. Kocher. Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems Advances in Cryptology (CRYPTO'96)Mas69] J. Massey. Shift-register synthesis and BCH decoding. Information TheoryMcE78] R.J. McEliece. A public-key cryptosystem based on algebraic coding theory. DSN progress report, pp.24-2821, 1819. ,
A simple power analysis attack on a McEliece cryptoprocessor Knapsack-type cryptosystems and algebraic coding theory. Problems of control and information theory The algebraic decoding of goppa codes, Journal of Cryptographic Engineering IEEE Transactions on Information Theory, vol.1, issue.212, pp.29-36159, 1975. ,
A secure implementation of a goppa decoder A method for obtaining digital signatures and public-key cryptosystems Algorithms for quantum computation : discrete logarithms and factoring, Cryptographic architectures embedded in reconfigurable devices-Cryptarchi 2013 Foundations of Computer Science Proceedings., 35th Annual Symposium onSho99] P.W. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM review, pp.120-126, 1978. ,
A timing attack against patterson algorithm in the mceliece pkc. Information, Security and Cryptology? ICISC, Side Channels in the McEliece PKC. Post-Quantum Cryptography, pp.161-175, 2008. ,
How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices, IACR Cryptology ePrint Archive, p.465, 2010. ,
A smart card implementation of the mceliece pkc Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, pp.47-59, 2010. ,
A timing attack against the secret permutation in the mceliece pkc, pp.95-107, 2010. ,
Timing attacks against the syndrome inversion in code-based cryptosystems, 2011. ,
A novel processor architecture for mceliece cryptosystem and fpga platforms, ASAP, pp.98-105, 2009. ,