2013
DOI: 10.1007/978-3-319-03515-4_19
|View full text |Cite
|
Sign up to set email alerts
|

Polynomial Structures in Code-Based Cryptography

Abstract: Abstract. In this article we discus a probability problem applied in the code based cryptography. It is related to the shape of the polynomials with exactly t different roots. We will show that the structure is very dense and the probability that this type of polynomials has at least one coefficient equal to zero is extremelly low. We treated this issue in our research of natural countermeasures to a timing attack against the polynomial evaluation.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…If the work factor (WF), namely, the time complexity of successfully attacking a cryptosystem, is greater, the public key cryptosystem based on the error-correcting code has more security. For the LDPC code, the WF of the DCA is heavily correlated with the line weight of ′ , and does not have a significant correlation with code length n [20]. To allow the QD code to resist a DCA, we use the MDPC code to improve the QD code, and the QD-MDPC code then generates a parity-check matrix H that has a larger density.…”
Section: Performance Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…If the work factor (WF), namely, the time complexity of successfully attacking a cryptosystem, is greater, the public key cryptosystem based on the error-correcting code has more security. For the LDPC code, the WF of the DCA is heavily correlated with the line weight of ′ , and does not have a significant correlation with code length n [20]. To allow the QD code to resist a DCA, we use the MDPC code to improve the QD code, and the QD-MDPC code then generates a parity-check matrix H that has a larger density.…”
Section: Performance Analysismentioning
confidence: 99%
“…If = 0, attackers can easy obtain the plaintext = ′−1 . Therefore, the WF of ISDA is associated with the error correcting vector e, and increases when the density of the error correcting vector e is added [20]. The MDPC code is compared with the LDPC code, and has a higher error correction capability.…”
Section: Isda Attack Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Each time a coefficient equals one or zero it will be store in a special table used afterwards for multiplication or addition. The case where a coefficient equals zero is rare and its probability has been studied in [4]. Nevertheless, each time there's a coefficient equal to zero we will no longer multiply it by the corresponding element as the multiplication equals zero.…”
Section: Identification Of a Leakagementioning
confidence: 99%
“…This problem was treated in [4] and the results show that the probability can be bounded. For the classical parameters of the McEliece PKC, i.e.…”
Section: Success Probabilitymentioning
confidence: 99%