-
1
-
-
84958666890
-
Failure of the McEliece public-key cryptosystem under message resend and related-message attack
-
Lecture Notes in Computer Science
-
T. A. Berson. Failure of the McEliece public-key cryptosystem under message resend and related-message attack. In Advances in Cryptology, CRYPTO 1997, Lecture Notes in Computer Science, pages 213-220, 1997.
-
(1997)
Advances in Cryptology, CRYPTO 1997
, pp. 213-220
-
-
Berson, T.A.1
-
2
-
-
84947809062
-
Cryptanalysis of the original McEliece cryptosystem
-
K. Ohta and D. Pei, editors, number 1514 in LNCS
-
A. Canteaut and N. Sendrier. Cryptanalysis of the original McEliece cryptosystem. In K. Ohta and D. Pei, editors, Advances in Cryptology - ASIACRYPT'98, number 1514 in LNCS, pages 187-199, 1998.
-
(1998)
Advances in Cryptology - ASIACRYPT'98
, pp. 187-199
-
-
Canteaut, A.1
Sendrier, N.2
-
3
-
-
0010922150
-
How to achieve a McEliece-based signature scheme
-
Colin Boyd, Editors, number 2248 in LNCS
-
N. Courtois, M. Finiasz and N. Sendrier. How to achieve a McEliece-based signature scheme. In Colin Boyd, Editors, Advances in Cryptology - ASIACRYPT'2001, number 2248 in LNCS, pages 151-174, 2001
-
(2001)
Advances in Cryptology - ASIACRYPT'2001
, pp. 151-174
-
-
Courtois, N.1
Finiasz, M.2
Sendrier, N.3
-
4
-
-
14844346471
-
The cryptographic security of the syndrome decoding problem for rank distance codes
-
K. Kim and T. Matsumoto, editors, Advances in Cryptology - ASIACRYPT '96, Springer-Verlag, November
-
F. Chabaud and J. Stern. The cryptographic security of the syndrome decoding problem for rank distance codes. In K. Kim and T. Matsumoto, editors, Advances in Cryptology - ASIACRYPT '96, volume 1163 of LNCS. Springer-Verlag, November 1996.
-
(1996)
LNCS
, vol.1163
-
-
Chabaud, F.1
Stern, J.2
-
5
-
-
84955563711
-
A new identification algorithm
-
Springer
-
K. Chen. A new identification algorithm. In Cryptographic policy and algorithms, volume 1029, pages 244-249. Springer, 1996.
-
(1996)
Cryptographic Policy and Algorithms
, vol.1029
, pp. 244-249
-
-
Chen, K.1
-
7
-
-
85013087026
-
A fast matrix decoding algorithm for rank-error correcting codes
-
G. Cohen, S. Litsyn, A. Lobstein, and G. Zémor, editors, Algebraic coding, Springer-Verlag
-
E. M. Gabidulin. A fast matrix decoding algorithm for rank-error correcting codes. In G. Cohen, S. Litsyn, A. Lobstein, and G. Zémor, editors, Algebraic coding, volume 573 of LNCS, pages 126-133. Springer-Verlag, 1991.
-
(1991)
LNCS
, vol.573
, pp. 126-133
-
-
Gabidulin, E.M.1
-
8
-
-
0348087983
-
Modified GPT PKC with right scrambler
-
Daniel Augot and Claude Carlet, editors, ISBN Number : 2-761-1179-3
-
E. M. Gabidulin and A. V. Ourivski. Modified GPT PKC with right scrambler. In Daniel Augot and Claude Carlet, editors, Proceedings of the 2nd International workshop on Coding and Cryptography, WCC 2001, pages 233-242, 2001. ISBN Number : 2-761-1179-3.
-
(2001)
Proceedings of the 2nd International Workshop on Coding and Cryptography, WCC 2001
, pp. 233-242
-
-
Gabidulin, E.M.1
Ourivski, A.V.2
-
9
-
-
84935622001
-
Ideals over a non-commutative ring and their application in cryptology
-
E .M. Gabidulin, A. V. Paramonov, and O. V. Tretjakov. Ideals over a non-commutative ring and their application in cryptology. LNCS, 547:482-489, 1991.
-
(1991)
LNCS
, vol.547
, pp. 482-489
-
-
Gabidulin, E.M.1
Paramonov, A.V.2
Tretjakov, O.V.3
-
10
-
-
0346827230
-
Severely denting the Gabidulin version of the McEliece public-key cryptosystem
-
J. K. Gibson. Severely denting the Gabidulin version of the McEliece public-key cryptosystem. Designs, Codes and Cryptography, 6:37-45, 1995.
-
(1995)
Designs, Codes and Cryptography
, vol.6
, pp. 37-45
-
-
Gibson, J.K.1
-
11
-
-
84947917832
-
The security of the Gabidulin public-key cryptosystem
-
U. Maurer, editor
-
J. K. Gibson. The security of the Gabidulin public-key cryptosystem. In U. Maurer, editor, EUROCRYPT'96, pages 212-223, 1996.
-
(1996)
EUROCRYPT'96
, pp. 212-223
-
-
Gibson, J.K.1
-
12
-
-
84958629363
-
Reaction attacks against several public-key cryptosystems
-
number 1726 in LNCS
-
C. Hall, I. Goldberg, and B. Schneier. Reaction attacks against several public-key cryptosystems. In Proceedings of the 2nd International Conference on Information and Communication Security, ICICS'99, number 1726 in LNCS, pages 2-12, 1999.
-
(1999)
Proceedings of the 2nd International Conference on Information and Communication Security, ICICS'99
, pp. 2-12
-
-
Hall, C.1
Goldberg, I.2
Schneier, B.3
-
13
-
-
0003777826
-
A public-key cryptosystem based on algebraic coding theory
-
Jet Propulsion Lab. DSN Progress Report
-
R. J. McEliece. A public-key cryptosystem based on algebraic coding theory. Technical report, Jet Propulsion Lab. DSN Progress Report, 1978.
-
(1978)
Technical Report
-
-
McEliece, R.J.1
-
14
-
-
0346196669
-
New technique for decoding codes in the rank metric and its cryptography applications
-
September
-
A. Ourivski and T. Johannson. New technique for decoding codes in the rank metric and its cryptography applications. Problems of Information Transmission, 38(3):237-246, September 2002.
-
(2002)
Problems of Information Transmission
, vol.38
, Issue.3
, pp. 237-246
-
-
Ourivski, A.1
Johannson, T.2
-
17
-
-
0346076640
-
Reducible rank codes and their applications to cryptography
-
December
-
A. V. Ourivski, E. M. Gabidulin, B. Honary, and B. Ammar. Reducible rank codes and their applications to cryptography. IEEE Transactions on Information Theory, 49(12):3289-3293, December 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.12
, pp. 3289-3293
-
-
Ourivski, A.V.1
Gabidulin, E.M.2
Honary, B.3
Ammar, B.4
-
18
-
-
5044246918
-
Fast Decoding of Rank-Codes with Rank Errors and Column Erasures
-
G. Richter and S. Plass. Fast Decoding of Rank-Codes with Rank Errors and Column Erasures In Proceedings of ISIT 2004, 2004.
-
(2004)
Proceedings of ISIT 2004
-
-
Richter, G.1
Plass, S.2
-
19
-
-
0000239931
-
-
Smart Card Research and Applications, LNCS 1820, J.-J. Quisquater and B. Schneier, Eds., Springer-Verlag
-
J. Daemen, V. Rijmen The Block Cipher Rijndael, Smart Card Research and Applications, LNCS 1820, J.-J. Quisquater and B. Schneier, Eds., Springer-Verlag, 2000, pp. 288-296.
-
(2000)
The Block Cipher Rijndael
, pp. 288-296
-
-
Daemen, J.1
Rijmen, V.2
-
20
-
-
0013017020
-
Rijndael, the advanced encryption standard
-
March
-
J. Daemen, V. Rijmen Rijndael, the advanced encryption standard, Dr. Dobb's Journal , Vol. 26, No. 3, March 2001, pp. 137-139.
-
(2001)
Dr. Dobb's Journal
, vol.26
, Issue.3
, pp. 137-139
-
-
Daemen, J.1
Rijmen, V.2
-
21
-
-
35048835408
-
-
http: //www.esat.kuleuven.ac.be/_rijmen/rijndael/rijndaelref.zip
-
-
-
-
22
-
-
0026116647
-
Maximum-Rank array codes and their application to crisscross error correction
-
March
-
R. M. Roth. Maximum-Rank array codes and their application to crisscross error correction. IEEE Transactions on Information Theory, 37(2):328-336, March 1991.
-
(1991)
IEEE Transactions on Information Theory
, vol.37
, Issue.2
, pp. 328-336
-
-
Roth, R.M.1
-
23
-
-
84455184676
-
Efficient generation of binary words of given weight
-
C. Boyd, editor, LNCS, December
-
N. Sendrier. Efficient generation of binary words of given weight. In C. Boyd, editor, Cryptography and Coding, 5th IMA Conference, Circencester, UK, LNCS, pages 184-187, December 1995.
-
(1995)
Cryptography and Coding, 5th IMA Conference, Circencester, UK
, pp. 184-187
-
-
Sendrier, N.1
-
24
-
-
0034318399
-
Enhancing the security of the McEliece public-key cryptosystem
-
H.-M. Sun. Enhancing the security of the McEliece public-key cryptosystem. Journal of Information Science and Engeneering, 16:799-812, 2000.
-
(2000)
Journal of Information Science and Engeneering
, vol.16
, pp. 799-812
-
-
Sun, H.-M.1
-
25
-
-
0031275868
-
The intractability of computing the minimum distance of a code
-
November
-
A. Vardy. The intractability of computing the minimum distance of a code. IEEE Transactions on Information Theory, 43(6): 1757-1766, November 1997.
-
(1997)
IEEE Transactions on Information Theory
, vol.43
, Issue.6
, pp. 1757-1766
-
-
Vardy, A.1
|