Leveraging HLS to Design a Versatile & High-Performance Classic McEliece Accelerator
Abstract
References
Index Terms
- Leveraging HLS to Design a Versatile & High-Performance Classic McEliece Accelerator
Recommendations
How to Backdoor (Classic) McEliece and How to Guard Against Backdoors
Post-Quantum CryptographyAbstractWe show how to backdoor the McEliece cryptosystem such that a backdoored public key is indistinguishable from a usual public key, but allows to efficiently retrieve the underlying secret key.
For good cryptographic reasons, McEliece uses a small ...
Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext
AbstractThreshold public-key encryption (threshold PKE) has various useful applications. A lot of threshold PKE schemes are proposed based on RSA, Diffie–Hellman and lattice, but to the best of our knowledge, code-based threshold PKEs have not been ...
Efficient Implementation of the Classic McEliece on ARMv8 Processors
Information Security ApplicationsAbstractClassic McEliece is a Code-based Key Encapsulation Mechanisms (KEM) and one of the candidate algorithms in the NIST PQC competition. Based on the McEliece cryptosystem developed in 1978, this system relies on the Niederreiter variant of McEliece. ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Journal Family
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 24Total Downloads
- Downloads (Last 12 months)24
- Downloads (Last 6 weeks)24
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in