Code-Based Cryptography by Unknown

Code-Based Cryptography by Unknown

Author:Unknown
Language: eng
Format: epub
ISBN: 9783030540746
Publisher: Springer International Publishing


5 Results

A description of the Backflip constant-time implementation is provided in Appendix B.

The Experimentation Platform. Our experiments were executed on an AWS EC2 instance with the Intel®Core Generation (Micro Architecture Codename “Sky Lake”[SKL]) Xeon®Platinum 8175M CPU 2.50 GHz. It has 384 GB RAM, 32K L1d and L1i cache, 1MiB L2 cache, and 32MiB L3 cache, where the Intel® Turbo Boost Technology was turned off.

The Code. The core functionality was written in x assembly and wrapped by assisting C code. The code uses the , and the and instructions. The code was compiled with gcc (version 7.4.0) in 64-bit mode, using the “O3” Optimization level, and run on a Linux (Ubuntu 18.04.2 LTS) OS. It uses the NTL library [21] compiled with the GF2X library [17].

Figure 8 in Appendix F shows the simulation results for BIKE-1, Level-1 and Level-3, using the Black-Gray and Backflip decoders. Note that we use the IND-CCA flows. The left panels present linear extrapolations and the right panels present quadratic extrapolations. The horizontal axis measures the block size r in bits, and the vertical axis shows the simulated values. Every panel displays several graphs associated with different X values. The minimal X is chosen so that the extrapolated r value for is still considered to be secure according to [3]. The maximal value of X is chosen to allow a meaningful extrapolation. We give two examples:

Example 2

Consider Black-Gray. Typically, there exists some number of iterations , where if decoding a syndrome requires more than j then the decoder fails (w.h.p) even if a large number of iterations is allowed.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.