Abstract
In this paper we describe the first implementation on smartcard of the code-based authentication protocol proposed by Stern at Crypto'93 and we give a securization of the scheme against side channel attacks. On the whole, this provides a secure implementation of a very practical authentication (and possibly signature) scheme which is mostly attractive for light-weight cryptography. © IFIP International Federation for Information Processing 2008.
Cite
CITATION STYLE
Cayrel, P. L., Gaborit, P., & Prouff, E. (2008). Secure implementation of the stern authentication and signature schemes for low-resource devices. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5189 LNCS, pp. 191–205). https://doi.org/10.1007/978-3-540-85893-5_14
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.