{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:46:48Z","timestamp":1725551208470},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642123672"},{"type":"electronic","value":"9783642123689"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12368-9_4","type":"book-chapter","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T10:30:40Z","timestamp":1270636240000},"page":"47-59","source":"Crossref","is-referenced-by-count":14,"title":["A Smart Card Implementation of the McEliece PKC"],"prefix":"10.1007","author":[{"given":"Falko","family":"Strenzke","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"4_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"4_CR2","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V. Miller","year":"1986","unstructured":"Miller, V.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"ElGamal, T.: A Public Key Cryptosystem and A Signature Based on Discrete Logarithms. IEEE Transactions on Information Theory (1985)","DOI":"10.1109\/TIT.1985.1057074"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings, 35th Annual Symposium on Foundation of Computer Science (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"issue":"5","key":"4_CR6","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P.W. Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing\u00a026(5), 1484\u20131509 (1997)","journal-title":"SIAM Journal on Computing"},{"key":"4_CR7","unstructured":"Proos, J., Zalka, C.: Shor\u2019s discrete logarithm quantum algorithm for elliptic curves. Technical Report quant-ph\/0301141, arXiv (2006)"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R. Merkle","year":"1990","unstructured":"Merkle, R.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Buchmann, J., Garcia, L., Dahmen, E., Doering, M., Klintsevich, E.: CMSS-An Improved Merkle Signature Scheme. In: 7th International Conference on Cryptology in India-Indocrypt, vol.\u00a06, pp. 349\u2013363 (2006)","DOI":"10.1007\/11941378_25"},{"key":"4_CR10","first-page":"114","volume":"42\u201344","author":"R.J. McEliece","year":"1978","unstructured":"McEliece, R.J.: A public key cryptosystem based on algebraic coding theory. DSN progress report\u00a042\u201344, 114\u2013116 (1978)","journal-title":"DSN progress report"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems - conversions for McEliece PKC. In: Practice and Theory in Public Key Cryptography - PKC \u201901 Proceedings (2001)","DOI":"10.1007\/3-540-44586-2_2"},{"key":"4_CR12","volume-title":"The theory of error correcting codes","author":"F.J. MacWilliams","year":"1997","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The theory of error correcting codes. North-Holland, Amsterdam (1997)"},{"key":"4_CR13","first-page":"207","volume":"6","author":"V.D. Goppa","year":"1970","unstructured":"Goppa, V.D.: A new class of linear correcting codes. Problems of Information Transmission\u00a06, 207\u2013212 (1970)","journal-title":"Problems of Information Transmission"},{"key":"4_CR14","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996), http:\/\/www.cacr.math.uwaterloo.ca\/hac\/"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Engelbert, D., Overbeck, R., Schmidt, A.: A Summary of McEliece-Type Cryptosystems and their Security. Journal of Mathematical Cryptology (2007)","DOI":"10.1515\/JMC.2007.009"},{"issue":"1","key":"4_CR16","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/18.651067","volume":"44","author":"A. Canteaut","year":"1998","unstructured":"Canteaut, A., Chabaud, F.: A new algorithm for finding minimum-weight words in a linear code: application to primitive narrow-sense BCH-codes of length 511. IEEE Transactions on Information Theory\u00a044(1), 367\u2013378 (1998)","journal-title":"IEEE Transactions on Information Theory"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-88403-3_3","volume-title":"Post-Quantum Cryptography","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein, D.J., Lange, T., Peters, C.: Attacking and defending the McEliece cryptosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol.\u00a05299, pp. 31\u201346. Springer, Heidelberg (2008)"},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1109\/TIT.1975.1055350","volume":"21","author":"N. Patterson","year":"1975","unstructured":"Patterson, N.: Algebraic decoding of Goppa codes. IEEE Trans. Info. Theory\u00a021, 203\u2013207 (1975)","journal-title":"IEEE Trans. Info. Theory"},{"key":"4_CR19","unstructured":"Overbeck, R.: An Analysis of Side Channels in the McEliece PKC (2008), https:\/\/www.cosic.esat.kuleuven.be\/nato_arw\/slides_participants\/Overbeck_slides_nato08.pdf"},{"key":"4_CR20","unstructured":"Infineon Technologies AG: SLE76 Product Data Sheet, http:\/\/www.infineon.com\/cms\/de\/product\/channel.html?channel=db3a3043156fd57301161520ab8b1c4c ."},{"key":"4_CR21","unstructured":"Biswas, B., Sendrier, N.: HyMES - Hybrid McEliece System, http:\/\/ralyx.inria.fr\/2008\/Raweb\/secret\/uid18.html"},{"key":"4_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-88403-3_4","volume-title":"Post-Quantum Cryptography","author":"B. Biswas","year":"2008","unstructured":"Biswas, B., Sendrier, N.: McEliece cryptosystem in real life: theory and practice. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol.\u00a05299, pp. 47\u201362. Springer, Heidelberg (2008)"},{"key":"4_CR23","unstructured":"D\u00f6ring, M.: On the Theory and Practice of Quantum-Immune Cryptography. PHD-Thesis (2008), http:\/\/www.cdc.informatik.tu-darmstadt.de\/reports\/README.diss.html"},{"key":"4_CR24","unstructured":"The FlexiProvider group at Technische Universit\u00e4t Darmstadt: FlexiProvider, an open source Java Cryptographic Service Provider, http:\/\/www.flexiprovider.de"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12368-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T01:43:53Z","timestamp":1559007833000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12368-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642123672","9783642123689"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12368-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}