{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:54:00Z","timestamp":1764996840958},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540884026"},{"type":"electronic","value":"9783540884033"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88403-3_15","type":"book-chapter","created":{"date-parts":[[2008,10,7]],"date-time":"2008-10-07T04:26:31Z","timestamp":1223353591000},"page":"216-229","source":"Crossref","is-referenced-by-count":41,"title":["Side Channels in the McEliece PKC"],"prefix":"10.1007","author":[{"given":"Falko","family":"Strenzke","sequence":"first","affiliation":[]},{"given":"Erik","family":"Tews","sequence":"additional","affiliation":[]},{"given":"H. Gregor","family":"Molter","sequence":"additional","affiliation":[]},{"given":"Raphael","family":"Overbeck","sequence":"additional","affiliation":[]},{"given":"Abdulhadi","family":"Shoufan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"15_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"15_CR2","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V.S. Miller","year":"1986","unstructured":"Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"ElGamal, T.: A Public Key Cryptosystem and A Signature Based on Discrete Logarims. IEEE Transactions on Information Theory (1985)","DOI":"10.1109\/TIT.1985.1057074"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings, 35-th Annual Symposium on Foundation of Computer Science (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"issue":"5","key":"15_CR6","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P.W. Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing\u00a026(5), 1484\u20131509 (1997)","journal-title":"SIAM Journal on Computing"},{"key":"15_CR7","unstructured":"Proos, J., Zalka, C.: Shor\u2019s discrete logarithm quantum algorithm for elliptic curves, Technical Report quant-ph\/0301141, arXiv (2006)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Merkle, R.: A Certified Digital Signature. In: Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, pp. 218\u2013238 (1989)","DOI":"10.1007\/0-387-34805-0_21"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Buchmann, J., Garcia, L., Dahmen, E., Doering, M., Klintsevich, E.: CMSS-An Improved Merkle Signature Scheme. In: 7th International Conference on Cryptology in India-Indocrypt, vol.\u00a06, pp. 349\u2013363 (2006)","DOI":"10.1007\/11941378_25"},{"key":"15_CR10","first-page":"114","volume":"42-44","author":"R.J. McEliece","year":"1978","unstructured":"McEliece, R.J.: A public key cryptosystem based on algebraic coding theory. DSN progress report\u00a042-44, 114\u2013116 (1978)","journal-title":"DSN progress report"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","volume-title":"Public Key Cryptography","author":"K. Korbara","year":"2001","unstructured":"Korbara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems - conversions for McEliece PKC. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol.\u00a01992. Springer, Heidelberg (2001)"},{"key":"15_CR12","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, pp. 104\u2013113 (1996)","DOI":"10.1007\/3-540-68697-5_9"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO 1999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"15_CR15","unstructured":"Tsunoo, Y., Tsujihara, E., Minematsu, K., Miyauchi, H.: Cryptanalysis of Block Ciphers Implemented on Computers with Cache. In: International Symposium on Information Theory and Applications, pp. 803\u2013806 (2002)"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/11545262_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"W. Schindler","year":"2005","unstructured":"Schindler, W., Lemke, K., Paar, C.: A Stochastic Model for Differential Side Channel Cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 30\u201346. Springer, Heidelberg (2005)"},{"key":"15_CR17","volume-title":"The theory of error correcting codes","author":"F.J. MacWilliams","year":"1997","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The theory of error correcting codes. North-Holland, Amsterdam (1997)"},{"key":"15_CR18","first-page":"207","volume":"6","author":"V.D. Goppa","year":"1970","unstructured":"Goppa, V.D.: A new class of linear correcting codes. Problems of Information Transmission\u00a06, 207\u2013212 (1970)","journal-title":"Problems of Information Transmission"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Engelbert, D., Overbeck, R., Schmidt, A.: A Summary of McEliece-Type Cryptosystems and their Security. Journal of Mathematical Cryptology (2006) (accepted for publication)","DOI":"10.1515\/JMC.2007.009"},{"issue":"1","key":"15_CR20","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/18.651067","volume":"44","author":"A. Canteaut","year":"1998","unstructured":"Canteaut, A., Chabaud, F.: A new algorithm for finding minimum-weight words in a linear code: application to primitive narrow-sense BCH-codes of length 511. IEEE Transactions on Information Theory\u00a044(1), 367\u2013378 (1998)","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-540-46588-1_10","volume-title":"Public Key Cryptography","author":"D. Pointcheval","year":"2000","unstructured":"Pointcheval, D.: Chosen-chipertext security for any one-way cryptosystem. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol.\u00a01751, pp. 129\u2013146. Springer, Heidelberg (2000)"},{"key":"15_CR22","unstructured":"Percival, C.: Cache missing for fun and profit, http:\/\/www.daemonology.net\/papers\/htt.pdf"},{"key":"15_CR23","series-title":"Lecture Notes in Computer Science","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"W. Schindler","year":"2008","unstructured":"Schindler, W., Ac\u0131i\u00e7mez, O.: A Vulnerability in RSA Implementations due to Instruction Cache Analysis and its Demonstration on OpenSSL. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol.\u00a04964, Springer, Heidelberg (2008)"},{"key":"15_CR24","series-title":"Lecture Notes in Computer Science","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"O. Ac\u0131i\u00e7mez","year":"2007","unstructured":"Ac\u0131i\u00e7mez, O., Seifert, J.P., Ko\u00e7, \u00c7.: Predicting secret keys via branch prediction. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol.\u00a04377. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88403-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T12:58:46Z","timestamp":1557838726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88403-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540884026","9783540884033"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88403-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}