메뉴 건너뛰기




Volumn E85-A, Issue 1, 2002, Pages 74-83

Semantically secure McEliece public-key cryptosystem

Author keywords

Coding theory; Conversion; McEliece public key cryptosystem; Provable security; Semantic security

Indexed keywords

ALGORITHMS; POLYNOMIALS; PUBLIC KEY CRYPTOGRAPHY; SECURITY SYSTEMS;

EID: 0036454588     PISSN: 09168508     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (29)
  • 1
    • 80052017185 scopus 로고
    • Security-related comments regarding McEliece's public-key cryptosystem
    • Proc. CRYPTO'87, Springer-Verlag
    • C.M. Adams and H. Meijer, "Security-related comments regarding McEliece's public-key cryptosystem," Proc. CRYPTO'87, LNCS 293, pp.224-228, Springer-Verlag, 1988.
    • (1988) LNCS , vol.293 , pp. 224-228
    • Adams, C.M.1    Meijer, H.2
  • 2
    • 84948986458 scopus 로고
    • Optimal asymmetric encryption
    • Proc. EUROCRYPT'94
    • M. Bellare and P. Rogaway, "Optimal asymmetric encryption," Proc. EUROCRYPT'94, LNCS 950, pp.92-111, 1995.
    • (1995) LNCS , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 84958666890 scopus 로고    scopus 로고
    • Failure of the McEliece public-key cryptosystern under message-resend and related-message attack
    • Proc. CRYPTO'97, Springer-Verlag
    • T. Berson, "Failure of the McEliece public-key cryptosystern under message-resend and related-message attack," Proc. CRYPTO'97, LNCS 1294, pp.213-220, Springer-Verlag, 1997.
    • (1997) LNCS , vol.1294 , pp. 213-220
    • Berson, T.1
  • 4
    • 84947809062 scopus 로고    scopus 로고
    • Cryptoanalysis of the original McEliece cryptosystem
    • A. Canteaut and N. Sendrier, "Cryptoanalysis of the original McEliece cryptosystem," Proc. ASIACRYPT'98, pp.187-199, 1998.
    • (1998) Proc. ASIACRYPT'98 , pp. 187-199
    • Canteaut, A.1    Sendrier, N.2
  • 5
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M. Hellman "New directions in cryptography," IEEE Trans. IT, vol.22, no.6, pp.644-654, 1976.
    • (1976) IEEE Trans. IT , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 7
    • 84947905764 scopus 로고    scopus 로고
    • An efficient pseudo-random generator provably as secure as syndrome decoding
    • Proc. EUROCRYPT'96, Springer-Verlag
    • J.B. Fischer and J. Stern, "An efficient pseudo-random generator provably as secure as syndrome decoding," Proc. EUROCRYPT'96, LNCS 1070, pp.245-255, Springer-Verlag, 1996.
    • (1996) LNCS , vol.1070 , pp. 245-255
    • Fischer, J.B.1    Stern, J.2
  • 8
    • 84956859011 scopus 로고    scopus 로고
    • How to enhance the security of public-key encryption at minimum cost
    • Proc. PKC'99
    • E. Fujisaki and T. Okamoto, "How to enhance the security of public-key encryption at minimum cost," Proc. PKC'99, LNCS 1560, pp.53-68, 1999.
    • (1999) LNCS , vol.1560 , pp. 53-68
    • Fujisaki, E.1    Okamoto, T.2
  • 9
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Proc. CRYPTO'99
    • E. Fujisaki and T. Okamoto, "Secure integration of asymmetric and symmetric encryption schemes," Proc. CRYPTO'99, LNCS 1666, pp.535-554, 1999.
    • (1999) LNCS , vol.1666 , pp. 535-554
    • Fujisaki, E.1    Okamoto, T.2
  • 11
    • 25444433745 scopus 로고
    • Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem
    • Proc. EUROCRYPT'91, Springer-Verlag
    • J.K. Gibson, "Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem," Proc. EUROCRYPT'91, LNCS 547, pp.517-521, Springer-Verlag, 1991.
    • (1991) LNCS , vol.547 , pp. 517-521
    • Gibson, J.K.1
  • 13
    • 84958629363 scopus 로고    scopus 로고
    • Reaction attacks against several public-key cryptosystems
    • Proc. 2nd International Conference on Information and Communications Security (ICICS'99)
    • C. Hall, I. Goldberg, and B. Schneier, "Reaction attacks against several public-key cryptosystems," Proc. 2nd International Conference on Information and Communications Security (ICICS'99), LNCS 1726, pp.2-12, 1999.
    • (1999) LNCS , vol.1726 , pp. 2-12
    • Hall, C.1    Goldberg, I.2    Schneier, B.3
  • 16
    • 85027121610 scopus 로고    scopus 로고
    • OAEP++ - Another simple bug fix in OAEP
    • K. Kobara and H. Imai, "OAEP++-Another simple bug fix in OAEP," Rump Session at Asiacrypt 2000: also available at http://imailab-www.iis.u-tokyo.ac.jp/kobara/Material/OAEP++.pdf, 2000.
    • (2000) Rump Session at Asiacrypt 2000
    • Kobara, K.1    Imai, H.2
  • 17
    • 85034651324 scopus 로고
    • An observation on the security of McEliece's public-key cryptosystem
    • Proc. EUROCRYPT'88, Springer-Verlag
    • P.J. Lee and E.F. Brickell, "An observation on the security of McEliece's public-key cryptosystem," Proc. EUROCRYPT'88, LNCS 330, pp.275-280, Springer-Verlag, 1988.
    • (1988) LNCS , vol.330 , pp. 275-280
    • Lee, P.J.1    Brickell, E.F.2
  • 19
  • 21
    • 14844330007 scopus 로고    scopus 로고
    • REACT: Rapid enhanced-security asymmetric cryptosystem transform
    • T. Okamoto and D. Pointcheval, "REACT: Rapid enhanced-security asymmetric cryptosystem transform," Proc. RSA Conference'01, 2001.
    • (2001) Proc. RSA Conference'01
    • Okamoto, T.1    Pointcheval, D.2
  • 22
    • 84957795480 scopus 로고    scopus 로고
    • Chosen-ciphertext security for any one-way cryptosystem
    • Proc. PKC 2000, Springer-Verlag
    • D. Pointcheval, "Chosen-ciphertext security for any one-way cryptosystem," Proc. PKC 2000, LNCS 1751, pp.129146, Springer-Verlag, 2000.
    • (2000) LNCS , vol.1751 , pp. 129-146
    • Pointcheval, D.1
  • 23
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • P.W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM J. Comput., vol.26, pp.1484-1509, 1997.
    • (1997) SIAM J. Comput. , vol.26 , pp. 1484-1509
    • Shor, P.W.1
  • 25
    • 84964937021 scopus 로고
    • A method for finding codewords of small weight
    • Proc. Coding Theory and Applications, Springer-Verlag
    • J. Stern, "A method for finding codewords of small weight," Proc. Coding Theory and Applications, LNCS 388, pp.106-113, Springer-Verlag, 1989.
    • (1989) LNCS , vol.388 , pp. 106-113
    • Stern, J.1
  • 26
    • 84947733218 scopus 로고    scopus 로고
    • Improving the security of the McEliece public-key cryptosystem
    • H.M. Sun, "Improving the security of the McEliece public-key cryptosystem," Proc. ASIACRYPT'98, pp.200-213, 1998.
    • (1998) Proc. ASIACRYPT'98 , pp. 200-213
    • Sun, H.M.1
  • 27
    • 0034318399 scopus 로고    scopus 로고
    • Enhancing the security of the McEliece public-key cryptosystem
    • H.M. Sun, "Enhancing the security of the McEliece public-key cryptosystem," J. Information Science & Engineering, 2000.
    • (2000) J. Information Science & Engineering
    • Sun, H.M.1
  • 28
    • 0033885534 scopus 로고    scopus 로고
    • Further cryptanalysis of the McEliece public-key cryptosystem
    • H.M. Sun, "Further cryptanalysis of the McEliece public-key cryptosystem," IEEE Trans. Commun. Lett., vol.4, pp.18-19, 2000.
    • (2000) IEEE Trans. Commun. Lett. , vol.4 , pp. 18-19
    • Sun, H.M.1
  • 29
    • 0031275868 scopus 로고    scopus 로고
    • The intractability of computing the minimum distance of a code
    • A. Vardy, "The intractability of computing the minimum distance of a code," IEEE Trans. IT, vol.43, no.6, pp.1757-1766, 1997.
    • (1997) IEEE Trans. IT , vol.43 , Issue.6 , pp. 1757-1766
    • Vardy, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.