[Resource Topic] 2010/465: How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices

Welcome to the resource topic for 2010/465

Title:
How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices

Authors: Falko Strenzke

Abstract:

While it is generally believed that due to their large public key sizes code based public key schemes cannot be conveniently used when memory-constrained devices are involved, we propose an approach for Public Key Infrastructure (PKI) scenarios which totally eliminates the need to store public keys of communication partners. Instead, all the necessary computation steps are performed during the transmission of the key. We show the feasibility of the approach through an example implementation and give arguments that it will be possible for a smart card controller to carry out the associated computations to sustain the transmission rates of possible future high speed contactless interfaces.

ePrint: https://eprint.iacr.org/2010/465

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .