On arithmetical algorithms over finite fields
Journal of Combinatorial Theory Series A
Proceedings of the 1996 international symposium on Symbolic and algebraic computation
ISSAC '96 International Symposium on Symbolic and Algebraic Computation
Arithmetic and factorization of polynomial over F2 (extended abstract)
ISSAC '96 Proceedings of the 1996 international symposium on Symbolic and algebraic computation
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
A high-speed sorting procedure
Communications of the ACM
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
How to Achieve a McEliece-Based Digital Signature Scheme
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Proceedings of the fifteenth annual ACM symposium on Theory of computing
STOC '83 Proceedings of the fifteenth annual ACM symposium on Theory of computing
STOC '83 Proceedings of the fifteenth annual ACM symposium on Theory of computing
On the algebraic complexity of matrix multiplication.
On the algebraic complexity of matrix multiplication.
Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers (Lecture Notes in Computer Science)
The Salsa20 Family of Stream Ciphers
New Stream Cipher Designs
Fast modular transforms via division
SWAT '72 Proceedings of the 13th Annual Symposium on Switching and Automata Theory (swat 1972)
Sorting networks and their applications
AFIPS '68 (Spring) Proceedings of the April 30--May 2, 1968, spring joint computer conference
Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
Attacking and Defending the McEliece Cryptosystem
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
McEliece Cryptosystem Implementation: Theory and Practice
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
Post Quantum Cryptography
Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '09 Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '09 Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
Journal of Computer and System Sciences
Additive fast Fourier transforms over finite fields
IEEE Transactions on Information Theory
Proceedings of the 17th international conference on Selected areas in cryptography
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Parallel-CFS: strengthening the CFS McEliece-based signature scheme
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
High-speed high-security signatures
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
The Poly1305-AES message-authentication code
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Proceedings of the Third international conference on Post-Quantum Cryptography
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
Information-set decoding for linear codes over Fq
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
A timing attack against the secret permutation in the mceliece PKC
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
Proceedings of the 2010 international conference on Topics in Cryptology
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Simplified high-speed high-distance list decoding for alternant codes
PQCrypto'11 Proceedings of the 4th international conference on Post-Quantum Cryptography
The algebraic decoding of Goppa codes
IEEE Transactions on Information Theory
A fast algorithm for the Fourier transform over finite fields and its VLSI implementation
IEEE Journal on Selected Areas in Communications
Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Towards one cycle per bit asymmetric encryption: code-based cryptography on reconfigurable hardware
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Hi-index | 0.00 |
This paper presents extremely fast algorithms for code-based public-key cryptography, including full protection against timing attacks. For example, at a 2128 security level, this paper achieves a reciprocal decryption throughput of just 60493 cycles (plus cipher cost etc.) on a single Ivy Bridge core. These algorithms rely on an additive FFT for fast root computation, a transposed additive FFT for fast syndrome computation, and a sorting network to avoid cache-timing attacks.