-
1
-
-
80052017185
-
Security-related comments regarding McEliece's public-key cryptosystem
-
Proc. CRYPTO'87, Springer-Verlag
-
C.M. Adams and H. Meijer, "Security-related comments regarding McEliece's public-key cryptosystem," Proc. CRYPTO'87, LNCS 293, pp.224-228, Springer-Verlag, 1988.
-
(1988)
LNCS
, vol.293
, pp. 224-228
-
-
Adams, C.M.1
Meijer, H.2
-
2
-
-
84948986458
-
Optimal asymmetric encryption
-
Proc. EUROCRYPT'94
-
M. Bellare and P. Rogaway, "Optimal asymmetric encryption," Proc. EUROCRYPT'94, LNCS 950, pp.92-111, 1995.
-
(1995)
LNCS
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
84958666890
-
Failure of the McEliece public-key cryptosystern under message-resend and related-message attack
-
Proc. CRYPTO'97, Springer-Verlag
-
T. Berson, "Failure of the McEliece public-key cryptosystern under message-resend and related-message attack," Proc. CRYPTO'97, LNCS 1294, pp.213-220, Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 213-220
-
-
Berson, T.1
-
4
-
-
84947809062
-
Cryptoanalysis of the original McEliece cryptosystem
-
A. Canteaut and N. Sendrier, "Cryptoanalysis of the original McEliece cryptosystem," Proc. ASIACRYPT'98, pp.187-199, 1998.
-
(1998)
Proc. ASIACRYPT'98
, pp. 187-199
-
-
Canteaut, A.1
Sendrier, N.2
-
5
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman "New directions in cryptography," IEEE Trans. IT, vol.22, no.6, pp.644-654, 1976.
-
(1976)
IEEE Trans. IT
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
7
-
-
84947905764
-
An efficient pseudo-random generator provably as secure as syndrome decoding
-
Proc. EUROCRYPT'96, Springer-Verlag
-
J.B. Fischer and J. Stern, "An efficient pseudo-random generator provably as secure as syndrome decoding," Proc. EUROCRYPT'96, LNCS 1070, pp.245-255, Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 245-255
-
-
Fischer, J.B.1
Stern, J.2
-
8
-
-
84956859011
-
How to enhance the security of public-key encryption at minimum cost
-
Proc. PKC'99
-
E. Fujisaki and T. Okamoto, "How to enhance the security of public-key encryption at minimum cost," Proc. PKC'99, LNCS 1560, pp.53-68, 1999.
-
(1999)
LNCS
, vol.1560
, pp. 53-68
-
-
Fujisaki, E.1
Okamoto, T.2
-
9
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Proc. CRYPTO'99
-
E. Fujisaki and T. Okamoto, "Secure integration of asymmetric and symmetric encryption schemes," Proc. CRYPTO'99, LNCS 1666, pp.535-554, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 535-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
10
-
-
1142282397
-
RSA-OAEP is secure under the RSA assumption
-
E. Fujisaki, T. Okamoto, D. Pointcheval, and J. Stern, "RSA-OAEP is secure under the RSA assumption," Proc. CRYPTO 2001, 2001.
-
(2001)
Proc. CRYPTO 2001
-
-
Fujisaki, E.1
Okamoto, T.2
Pointcheval, D.3
Stern, J.4
-
11
-
-
25444433745
-
Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem
-
Proc. EUROCRYPT'91, Springer-Verlag
-
J.K. Gibson, "Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem," Proc. EUROCRYPT'91, LNCS 547, pp.517-521, Springer-Verlag, 1991.
-
(1991)
LNCS
, vol.547
, pp. 517-521
-
-
Gibson, J.K.1
-
13
-
-
84958629363
-
Reaction attacks against several public-key cryptosystems
-
Proc. 2nd International Conference on Information and Communications Security (ICICS'99)
-
C. Hall, I. Goldberg, and B. Schneier, "Reaction attacks against several public-key cryptosystems," Proc. 2nd International Conference on Information and Communications Security (ICICS'99), LNCS 1726, pp.2-12, 1999.
-
(1999)
LNCS
, vol.1726
, pp. 2-12
-
-
Hall, C.1
Goldberg, I.2
Schneier, B.3
-
16
-
-
85027121610
-
OAEP++ - Another simple bug fix in OAEP
-
K. Kobara and H. Imai, "OAEP++-Another simple bug fix in OAEP," Rump Session at Asiacrypt 2000: also available at http://imailab-www.iis.u-tokyo.ac.jp/kobara/Material/OAEP++.pdf, 2000.
-
(2000)
Rump Session at Asiacrypt 2000
-
-
Kobara, K.1
Imai, H.2
-
17
-
-
85034651324
-
An observation on the security of McEliece's public-key cryptosystem
-
Proc. EUROCRYPT'88, Springer-Verlag
-
P.J. Lee and E.F. Brickell, "An observation on the security of McEliece's public-key cryptosystem," Proc. EUROCRYPT'88, LNCS 330, pp.275-280, Springer-Verlag, 1988.
-
(1988)
LNCS
, vol.330
, pp. 275-280
-
-
Lee, P.J.1
Brickell, E.F.2
-
19
-
-
0002448405
-
A public-key cryptosystem based on algebraic coding theory
-
R.J. McEliece, "A public-key cryptosystem based on algebraic coding theory," Deep Space Network Progress Report, 1978.
-
(1978)
Deep Space Network Progress Report
-
-
McEliece, R.J.1
-
20
-
-
0004192381
-
McEliece public-key encryption
-
CRC Press
-
A.J. Menezes, P.C. Oorsehot, and S.A. Vanstone, "McEliece public-key encryption," in Handbook of Applied Cryptography, p.299, CRC Press, 1997.
-
(1997)
Handbook of Applied Cryptography
, pp. 299
-
-
Menezes, A.J.1
Oorsehot, P.C.2
Vanstone, S.A.3
-
21
-
-
14844330007
-
REACT: Rapid enhanced-security asymmetric cryptosystem transform
-
T. Okamoto and D. Pointcheval, "REACT: Rapid enhanced-security asymmetric cryptosystem transform," Proc. RSA Conference'01, 2001.
-
(2001)
Proc. RSA Conference'01
-
-
Okamoto, T.1
Pointcheval, D.2
-
22
-
-
84957795480
-
Chosen-ciphertext security for any one-way cryptosystem
-
Proc. PKC 2000, Springer-Verlag
-
D. Pointcheval, "Chosen-ciphertext security for any one-way cryptosystem," Proc. PKC 2000, LNCS 1751, pp.129146, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1751
, pp. 129-146
-
-
Pointcheval, D.1
-
23
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
P.W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM J. Comput., vol.26, pp.1484-1509, 1997.
-
(1997)
SIAM J. Comput.
, vol.26
, pp. 1484-1509
-
-
Shor, P.W.1
-
25
-
-
84964937021
-
A method for finding codewords of small weight
-
Proc. Coding Theory and Applications, Springer-Verlag
-
J. Stern, "A method for finding codewords of small weight," Proc. Coding Theory and Applications, LNCS 388, pp.106-113, Springer-Verlag, 1989.
-
(1989)
LNCS
, vol.388
, pp. 106-113
-
-
Stern, J.1
-
26
-
-
84947733218
-
Improving the security of the McEliece public-key cryptosystem
-
H.M. Sun, "Improving the security of the McEliece public-key cryptosystem," Proc. ASIACRYPT'98, pp.200-213, 1998.
-
(1998)
Proc. ASIACRYPT'98
, pp. 200-213
-
-
Sun, H.M.1
-
27
-
-
0034318399
-
Enhancing the security of the McEliece public-key cryptosystem
-
H.M. Sun, "Enhancing the security of the McEliece public-key cryptosystem," J. Information Science & Engineering, 2000.
-
(2000)
J. Information Science & Engineering
-
-
Sun, H.M.1
-
28
-
-
0033885534
-
Further cryptanalysis of the McEliece public-key cryptosystem
-
H.M. Sun, "Further cryptanalysis of the McEliece public-key cryptosystem," IEEE Trans. Commun. Lett., vol.4, pp.18-19, 2000.
-
(2000)
IEEE Trans. Commun. Lett.
, vol.4
, pp. 18-19
-
-
Sun, H.M.1
-
29
-
-
0031275868
-
The intractability of computing the minimum distance of a code
-
A. Vardy, "The intractability of computing the minimum distance of a code," IEEE Trans. IT, vol.43, no.6, pp.1757-1766, 1997.
-
(1997)
IEEE Trans. IT
, vol.43
, Issue.6
, pp. 1757-1766
-
-
Vardy, A.1
|