McBits : Fast constant-time code-based cryptography

D.J. Bernstein, T. Chou, P. Schwabe

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

72 Citaten (Scopus)
2 Downloads (Pure)

Samenvatting

This paper presents extremely fast algorithms for code-based public-key cryptography, including full protection against timing attacks. For example, at a 2^128 security level, this paper achieves a reciprocal decryption throughput of just 60493 cycles (plus cipher cost etc.) on a single Ivy Bridge core. These algorithms rely on an additive FFT for fast root computation, a transposed additive FFT for fast syndrome computation, and a sorting network to avoid cache-timing attacks. Keywords: McEliece; Niederreiter; CFS; bitslicing; software implementation
Originele taal-2Engels
TitelCryptographic Hardware and Embedded Systems – CHES 2013 (15th International Workshop, Santa Barbara CA, USA, August 20-23, 2013. Proceedings)
RedacteurenG. Bertoni, J.-S. Coron
Plaats van productieBerlin
UitgeverijSpringer
Pagina's250-272
ISBN van geprinte versie978-3-642-40348-4
DOI's
StatusGepubliceerd - 2013
Evenementconference; 15th International Workshop on Cryptographic Hardware and Embedded Systems; 2013-08-20; 2013-08-23 -
Duur: 20 aug. 201323 aug. 2013

Publicatie series

NaamLecture Notes in Computer Science
Volume8086
ISSN van geprinte versie0302-9743

Congres

Congresconference; 15th International Workshop on Cryptographic Hardware and Embedded Systems; 2013-08-20; 2013-08-23
Periode20/08/1323/08/13
Ander15th International Workshop on Cryptographic Hardware and Embedded Systems

Vingerafdruk

Duik in de onderzoeksthema's van 'McBits : Fast constant-time code-based cryptography'. Samen vormen ze een unieke vingerafdruk.

Citeer dit