2019
DOI: 10.1007/978-3-030-30530-7_6
|View full text |Cite
|
Sign up to set email alerts
|

Don’t Forget Your Roots: Constant-Time Root Finding over $$\mathbb {F}_{2^m}$$

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Our proposal is based on the works of Berlekamp as is the Berlekamp Trace Algorithm. The proposal for BTA in [Martins et al 2019] results in a more constant performance when comparing the number of CPU cycles of multiple executions of the algorithm to find the roots of polynomials of a certain degree t. It does not address the variation in the number of CPU cycles when receiving an input of degree t and receiving an input of degree d < t, as we do in this work. Our proposal focuses on a more constant behavior when comparing the number of CPU cycles it takes to find the roots of polynomials of different degrees d < t when expecting t errors in the McEliece cryptosystem.…”
Section: Timing Side-channel Attacksmentioning
confidence: 95%
See 2 more Smart Citations
“…Our proposal is based on the works of Berlekamp as is the Berlekamp Trace Algorithm. The proposal for BTA in [Martins et al 2019] results in a more constant performance when comparing the number of CPU cycles of multiple executions of the algorithm to find the roots of polynomials of a certain degree t. It does not address the variation in the number of CPU cycles when receiving an input of degree t and receiving an input of degree d < t, as we do in this work. Our proposal focuses on a more constant behavior when comparing the number of CPU cycles it takes to find the roots of polynomials of different degrees d < t when expecting t errors in the McEliece cryptosystem.…”
Section: Timing Side-channel Attacksmentioning
confidence: 95%
“…In [Martins et al 2019], proposals are given to avoid timing side-channel attacks over the root-finding algorithm in the decoding step. The work describes countermeasures for four methods: exhaustive search, linearized polynomials, Berlekamp Trace Algorithm (BTA), and the Successive Resultant Algorithm.…”
Section: Timing Side-channel Attacksmentioning
confidence: 99%
See 1 more Smart Citation