메뉴 건너뛰기




Volumn , Issue , 2006, Pages 1733-1737

Two NP-complete problems in coding theory with an application in code based cryptography

Author keywords

[No Author keywords available]

Indexed keywords

CODING THEORY; SECURE KEY PARAMETERS; SIDELNIKOVSHESTAKOV ATTACK;

EID: 39049099966     PISSN: 21578101     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2006.261651     Document Type: Conference Paper
Times cited : (56)

References (12)
  • 1
    • 84888067252 scopus 로고    scopus 로고
    • R. McEliece, A public-key cryptosystem based on algebraic coding theory, DSN Progress Report, Jet Prop. Lab., California Inst. Tech., 42-44, pp. 114-116, 1978.
    • R. McEliece, "A public-key cryptosystem based on algebraic coding theory," DSN Progress Report, Jet Prop. Lab., California Inst. Tech., vol. 42-44, pp. 114-116, 1978.
  • 2
    • 0022582790 scopus 로고
    • Knapsack-type cryptosystems and algebraic coding theory
    • N. Niederreiter, "Knapsack-type cryptosystems and algebraic coding theory," Problems of Control and Information Theory, vol. 15, pp. 159-166, 1986.
    • (1986) Problems of Control and Information Theory , vol.15 , pp. 159-166
    • Niederreiter, N.1
  • 4
    • 0031675932 scopus 로고
    • A new algorithm for finding minimumweight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
    • A. Canteaut and F. Chabaud, "A new algorithm for finding minimumweight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511," IEEE Transactions on Information Theory, vol. 44, no. 1, pp. 367-378, 1988.
    • (1988) IEEE Transactions on Information Theory , vol.44 , Issue.1 , pp. 367-378
    • Canteaut, A.1    Chabaud, F.2
  • 6
    • 84929257781 scopus 로고
    • On insecurity of cryptosystems based on generalized Reed-Solomon codes
    • V. Sidelnikov and S. Shestakov, "On insecurity of cryptosystems based on generalized Reed-Solomon codes," Discrete Math. Appl., vol. 2, no. 4, pp. 439-444, 1992.
    • (1992) Discrete Math. Appl , vol.2 , Issue.4 , pp. 439-444
    • Sidelnikov, V.1    Shestakov, S.2
  • 7
    • 33646185189 scopus 로고    scopus 로고
    • A new structural attack for GPT and variants
    • Mycrypt 2005, SpringerVerlag
    • R. Overbeck, "A new structural attack for GPT and variants," in Mycrypt 2005, ser. Lecture Notes in Computer Science, no. 3715. SpringerVerlag, 2005.
    • (2005) ser. Lecture Notes in Computer Science , vol.3715
    • Overbeck, R.1
  • 9
    • 0028294826 scopus 로고
    • On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
    • R. Deng, Y. Li, and X. Wang, "On the equivalence of McEliece's and Niederreiter's public-key cryptosystems," IEEE Transactions on Information Theory, vol. 40, no. 1, pp. 271-273, 1994.
    • (1994) IEEE Transactions on Information Theory , vol.40 , Issue.1 , pp. 271-273
    • Deng, R.1    Li, Y.2    Wang, X.3
  • 10
    • 85034651324 scopus 로고
    • An observation on the security of McEliece's public-key cryptosystem
    • EUROCRYPT '88, Springer-Verlag
    • E. Brickell and J. Lee, "An observation on the security of McEliece's public-key cryptosystem," in EUROCRYPT '88, ser. Lecture Notes in Computer Science, no. 330. Springer-Verlag, 1988, pp. 275-280.
    • (1988) ser. Lecture Notes in Computer Science , vol.330 , pp. 275-280
    • Brickell, E.1    Lee, J.2
  • 12
    • 39049142010 scopus 로고    scopus 로고
    • Eine Sicherheitsanalyse des McEliece Kryptosystems,
    • diploma thesis, University of Greifswald, Federal Office for Information Security BSI
    • N. Tomforde, "Eine Sicherheitsanalyse des McEliece Kryptosystems," diploma thesis, University of Greifswald, Federal Office for Information Security (BSI), 2004.
    • (2004)
    • Tomforde, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.