2022
DOI: 10.1007/978-3-031-07082-2_16
|View full text |Cite
|
Sign up to set email alerts
|

McEliece Needs a Break – Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…A few recent papers [134][135][136] have attempted to provide concrete security estimates for the parameter sets submitted to the NIST PQC Standardization Process based on the above classical and quantum ISD attack papers. The analysis of [134] gave an anomalously low estimate for the cost of the MMT attack [122].…”
Section: Code-basedmentioning
confidence: 99%
See 1 more Smart Citation
“…A few recent papers [134][135][136] have attempted to provide concrete security estimates for the parameter sets submitted to the NIST PQC Standardization Process based on the above classical and quantum ISD attack papers. The analysis of [134] gave an anomalously low estimate for the cost of the MMT attack [122].…”
Section: Code-basedmentioning
confidence: 99%
“…The subsequent analysis of [135] determined that the previous analysis was in error and gave corrected estimates for the cost of several attacks (including MMT) in a variety of memory cost models. In [136] a software implementation was used to attempt to determine an appropriate memory cost model; however, since computationally intensive tasks typically benefit more from specialized hardware support than memory intensive tasks, this approach may underestimate the relative cost of memory access.…”
Section: Code-basedmentioning
confidence: 99%
“…The decisional version of the SDP, also known as the coset weight problem, belongs to the class of NP-complete problems [1]. Hence, all the existing algorithms for solving SDP are exponential in the code parameters [34], [35], [36], [37], [14]. Algorithms for solving the SDP include [38], [39], [40], [41], [42], [43], [44], [10], [11], [12], [13].…”
Section: Definition 1 (Binary Syndrome Decoding Problem Sdp)mentioning
confidence: 99%
“…The parameters of the cryptosystem are set with respect to the complexity of the best information-set decoding (ISD) attack strategy [10], [11], [12], [13], [14], which is the best known general attack path against code-based cryptosystems. As the scheme started to gain scientific confidence, sustained efforts were directed towards the practical side, i.e., implementations [15], [16], [17], [18], [19], [20], [21], [22], [23] as well as physical attacks, both side-channel [24] and fault injection attacks [25], [26], [27].…”
Section: Introductionmentioning
confidence: 99%
“…There is existing research on fast ISD implementations, including FPGA [14] and GPU implementations of Dumer's algorithm [15]. Recently, Esser et al presented fast CPUbased concrete implementations of the MMT and BJMM algorithms in [16]. There are also papers on proposals for quantum ISD algorithms, albeit simulation-based [17,18].…”
Section: Introductionmentioning
confidence: 99%