{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T05:05:19Z","timestamp":1725167119069},"reference-count":53,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2015,4,21]],"date-time":"2015-04-21T00:00:00Z","timestamp":1429574400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2015,5,21]]},"abstract":"With respect to performance, asymmetric code-based cryptography based on binary Goppa codes has been reported as a highly interesting alternative to RSA and ECC. A major drawback is still the large keys in the range between 50 and 100KB that prevented real-world applications of code-based cryptosystems so far. A recent proposal by Misoczki et al. showed that quasi-cyclic moderate-density parity-check (QC-MDPC) codes can be used in McEliece encryption, reducing the public key to just 0.6KB to achieve an 80-bit security level. In this article, we provide optimized decoding techniques for MDPC codes and survey several efficient implementations of the QC-MDPC McEliece cryptosystem. This includes high-speed and lightweight architectures for reconfigurable hardware, efficient coding styles for ARM\u2019s Cortex-M4 microcontroller, and novel high-performance software implementations that fully employ vector instructions. Finally, we conclude that McEliece encryption in combination with QC-MDPC codes not only enables high-performance implementations but also allows for lightweight designs on a wide range of different platforms.<\/jats:p>","DOI":"10.1145\/2700102","type":"journal-article","created":{"date-parts":[[2015,4,22]],"date-time":"2015-04-22T13:57:35Z","timestamp":1429711055000},"page":"1-27","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Implementing QC-MDPC McEliece Encryption"],"prefix":"10.1145","volume":"14","author":[{"given":"Ingo Von","family":"Maurich","sequence":"first","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Germany"}]},{"given":"Tobias","family":"Oder","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Germany"}]},{"given":"Tim","family":"G\u00fcneysu","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2015,4,21]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85855-3_17"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557609"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCE.2006.350824"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.161"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_31"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02384-2_6"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055873"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_15"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings. LNCS","volume":"8086","author":"Bertoni Guido","year":"2013"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0070-1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88403-3_4"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_9"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_35"},{"key":"e_1_2_1_14_1","volume-title":"Accessed","author":"BACS.","year":"2014"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_4"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings (LNCS), Henri Gilbert (Ed.)","volume":"6110","author":"Faug\u00e8re Jean-Charles","year":"2010"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057683"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2012.16"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_5"},{"key":"e_1_2_1_22_1","volume-title":"Modular Exponentiation Core Family for Xilinx FPGA. Data Sheet. (June","year":"2010"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25405-5_10"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_20"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_16"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCET.2010.5485568"},{"key":"e_1_2_1_27_1","volume-title":"Fundamentals of Error-Correcting Codes","author":"Huffman William Cary"},{"key":"e_1_2_1_28_1","volume-title":"Intel Digital Random Number Generator (DRNG). (2014). Accessed","year":"2014"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICM.2009.5418649"},{"key":"e_1_2_1_30_1","volume-title":"Public Key Cryptography (PKC\u201901), (LNCS)","author":"Kobara Kazukuni"},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the Workshop on the Security of the Internet of Things (SOCIOT\u201910)","author":"Liu Zhe","year":"2010"},{"key":"e_1_2_1_32_1","volume-title":"Applied Cryptography and Network Security (LNCS)","author":"Liu Zhe"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05445-7_24"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the 2013 IEEE International Symposium on Information Theory. IEEE","author":"Misoczki Rafael"},{"key":"e_1_2_1_36_1","volume-title":"Barreto","author":"Misoczki Rafael","year":"2012"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2000.866513"},{"key":"e_1_2_1_38_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-11659-4","volume-title":"Proceedings of the Post-Quantum Cryptography (PQCrypto\u201914)","volume":"8772","author":"Ed Michele Mosca","year":"2014"},{"key":"e_1_2_1_39_1","first-page":"159","article-title":"Knapsack-type cryptosystems and algebraic coding theory","volume":"15","author":"Niederreiter Harald","year":"1986","journal-title":"Problems Control Inform. Theory\/Problemy Upravlen. Teor. Inform."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-008-9175-9"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11786-009-0015-8"},{"key":"e_1_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Ray A. Perlner. 2014. Optimizing information set decoding algorithms to attack cyclosymmetric MDPC codes. In Post-Quantum Cryptography. 220--228. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-319-11659-4_13 Ray A. Perlner. 2014. Optimizing information set decoding algorithms to attack cyclosymmetric MDPC codes. In Post-Quantum Cryptography. 220--228. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-319-11659-4_13","DOI":"10.1007\/978-3-319-11659-4_13"},{"key":"e_1_2_1_43_1","volume-title":"Selected Areas in Cryptography (SAC\u201913), Revised Selected Papers (LNCS), Tanja Lange, Kristin E","author":"P\u00f6ppelmann Thomas"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865754"},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of Cryptographic Hardware and Embedded Systems (CHES\u201912)","volume":"7428","author":"Prouff Emmanuel","year":"2012"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_29"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2012.10"},{"key":"e_1_2_1_48_1","volume-title":"Donald Donglong Chen, and Ingrid Verbauwhede","author":"Roy Sujoy Sinha","year":"2013"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25405-5_4"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.115"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2009.29"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_19"},{"key":"e_1_2_1_54_1","volume-title":"How to maximize the potential of FPGA-based DSPs for modular exponentiation. IEICE Trans. 94-A, 1","author":"Suzuki Daisuke","year":"2011"},{"key":"e_1_2_1_55_1","volume-title":"Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE’& Exhibition (DATE’\u201914)","author":"von Maurich Ingo","year":"2014"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11659-4_16"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2700102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,30]],"date-time":"2022-12-30T21:44:02Z","timestamp":1672436642000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2700102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,21]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,5,21]]}},"alternative-id":["10.1145\/2700102"],"URL":"https:\/\/doi.org\/10.1145\/2700102","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"value":"1539-9087","type":"print"},{"value":"1558-3465","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,21]]},"assertion":[{"value":"2014-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-04-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}