scholarly journals Development of a simple power consumption model of information technology (IT) equipment for building simulation

2017 ◽  
Vol 142 ◽  
pp. 1787-1792 ◽  
Author(s):  
Howard Cheung ◽  
Shengwei Wang ◽  
Chaoqun Zhuang
2016 ◽  
Vol 67 (1) ◽  
pp. 85-92 ◽  
Author(s):  
Tomáš Fabšič ◽  
Ondrej Gallo ◽  
Viliam Hromada

Abstract It is known that a naive implementation of the decryption algorithm in the McEliece cryptosystem allows an attacker to recover the secret matrix P by measuring the power consumption. We demonstrate that a similar threat is present in the QC-LDPC variant of the McEliece cryptosystem. We consider a naive implementation of the decryption algorithm in the QC-LDPC McEliece cryptosystem. We demonstrate that this implementation leaks information about positions of ones in the secret matrix Q. We argue that this leakage allows an attacker to completely recover the matrix Q. In addition, we note that the quasi-cyclic nature of the matrix Q allows to accelerate the attack significantly.


2013 ◽  
Vol 24 (6) ◽  
pp. 615-632 ◽  
Author(s):  
Bjoern Dusza ◽  
Christoph Ide ◽  
Liang Cheng ◽  
Christian Wietfeld

Sign in / Sign up

Export Citation Format

Share Document