-
1
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Bellare M., Rogaway P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of CCS, pp. 62-73 (1993).
-
(1993)
Proceedings of CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
84948986458
-
Optimal asymmetric encryption - How to encrypt with RSA
-
Bellare M., Rogaway P.: Optimal asymmetric encryption - how to encrypt with RSA. In: EUROCRYPT '94, LNCS vol. 950, pp. 92-111 (1995).
-
(1995)
EUROCRYPT '94, LNCS
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
24144453496
-
Noise-tolerant learning, the parity problem, and the statistical query model
-
4
-
Blum A., Kalai A., Wasserman H. (2003). Noise-tolerant learning, the parity problem, and the statistical query model. J. ACM 50(4): 506-519
-
(2003)
J. ACM
, vol.50
, pp. 506-519
-
-
Blum, A.1
Kalai, A.2
Wasserman, H.3
-
5
-
-
0031675932
-
A new algorithm for finding minimum-weight words in a linear code: Application to primitive narrow-sense BCH codes of length 511
-
1
-
Canteaut A., Chabaud F. (1998). A new algorithm for finding minimum-weight words in a linear code: application to primitive narrow-sense BCH codes of length 511. IEEE Trans. Inform. Theory 44(1): 367-378
-
(1998)
IEEE Trans. Inform. Theory
, vol.44
, pp. 367-378
-
-
Canteaut, A.1
Chabaud, F.2
-
6
-
-
51349115957
-
Identity based identification and signature schemes using correcting codes
-
Cayrel P.-L., Gaborit P., Girault M.: Identity based identification and signature schemes using correcting codes. In: WCC '07, pp. 69-78 (2007).
-
(2007)
WCC '07
, pp. 69-78
-
-
Cayrel, P.-L.1
Gaborit, P.2
Girault, M.3
-
7
-
-
84929461941
-
How to achieve a McEliece-based digital signature scheme
-
Courtois N., Finiasz M., Sendrier N.: How to achieve a McEliece-based digital signature scheme. In: Asiacrypt '01, LNCS vol. 2248, pp. 157-174 (2001).
-
(2001)
Asiacrypt '01, LNCS
, vol.2248
, pp. 157-174
-
-
Courtois, N.1
Finiasz, M.2
Sendrier, N.3
-
8
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Cramer R., Shoup V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Crypto '98, LNCS vol. 1462, pp. 13-25 (1998).
-
(1998)
Crypto '98, LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
9
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
4
-
El Gamal T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31(4): 469-472
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, pp. 469-472
-
-
El Gamal, T.1
-
10
-
-
84858691417
-
A summary of McEliece-type cryptosystems and their security
-
2
-
Engelbert D., Overbeck R., Schmidt A. (2007). A summary of McEliece-type cryptosystems and their security. J. Math. Cryptol. 1(2): 151-199
-
(2007)
J. Math. Cryptol.
, vol.1
, pp. 151-199
-
-
Engelbert, D.1
Overbeck, R.2
Schmidt, A.3
-
11
-
-
84947905764
-
An efficient pseudo-random generator provably as secure as syndrome decoding
-
Fischer J.-B., Stern J.: An efficient pseudo-random generator provably as secure as syndrome decoding. In: Eurocrypt '96, LNCS vol. 1070, pp. 245-255 (1996).
-
(1996)
Eurocrypt '96, LNCS
, vol.1070
, pp. 245-255
-
-
Fischer, J.-B.1
Stern, J.2
-
12
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Fujisaki E., Okamoto T.: Secure integration of asymmetric and symmetric encryption schemes. In: Crypto '99, LNCS vol. 1666, pp. 537-554 (1999).
-
(1999)
Crypto '99, LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
14
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
Goldreich O., Levin L.A.: A hard-core predicate for all one-way functions. In: STOC '89, pp. 25-32 (1989).
-
(1989)
STOC '89
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.A.2
-
16
-
-
33746104831
-
Parallel and concurrent security of the HB and HB+ protocols
-
Katz J., Shin J.S.: Parallel and concurrent security of the HB and HB+ protocols. In: Eurocrypt '06, LNCS vol. 4004, pp. 73-87 (2006).
-
(2006)
Eurocrypt '06, LNCS
, vol.4004
, pp. 73-87
-
-
Katz, J.1
Shin, J.S.2
-
18
-
-
84937393537
-
Semantically secure McEliece public-key cryptosystems - Conversions for McEliece PKC
-
Kobara K., Imai H.: Semantically secure McEliece public-key cryptosystems - conversions for McEliece PKC. In: PKC '01, LNCS vol. 1992, pp. 19-35 (2001).
-
(2001)
PKC '01, LNCS
, vol.1992
, pp. 19-35
-
-
Kobara, K.1
Imai, H.2
-
19
-
-
0024078914
-
A probabilistic algorithm for computing minimum weights of large error-correcting codes
-
5
-
Leon J.S. (2001). A probabilistic algorithm for computing minimum weights of large error-correcting codes. IEEE Trans. Inform. Theory 34(5): 1354-1359
-
(2001)
IEEE Trans. Inform. Theory
, vol.34
, pp. 1354-1359
-
-
Leon, J.S.1
-
20
-
-
0028294826
-
The equivalence of McEliece's and Niederreiter's public-key cryptosystems
-
Li Y.X., Deng R.H., Wang X.M. (1994). The equivalence of McEliece's and Niederreiter's public-key cryptosystems. IEEE Trans. Inform. Theory 40, 271-273
-
(1994)
IEEE Trans. Inform. Theory
, vol.40
, pp. 271-273
-
-
Li, Y.X.1
Deng, R.H.2
Wang, X.M.3
-
21
-
-
0035270825
-
Weak keys in the McEliece public-key cryptosystem
-
3
-
Loidreau P., Sendrier N. (2001). Weak keys in the McEliece public-key cryptosystem. IEEE Trans. Inform. Theory 47(3): 1207-1211
-
(2001)
IEEE Trans. Inform. Theory
, vol.47
, pp. 1207-1211
-
-
Loidreau, P.1
Sendrier, N.2
-
23
-
-
0002448405
-
A public-key cryptosystem based on algebraic coding theory
-
McEliece R.J.: A public-key cryptosystem based on algebraic coding theory. Deep Space Network Prog. Rep. (1978).
-
(1978)
Deep Space Network Prog. Rep.
-
-
McEliece, R.J.1
-
24
-
-
0022582790
-
Knapsack-type cryptosystems and algebraic coding theory
-
2
-
Niederreiter H. (1986). Knapsack-type cryptosystems and algebraic coding theory. Prob. Control Inform. Theory 15(2): 159-166
-
(1986)
Prob. Control Inform. Theory
, vol.15
, pp. 159-166
-
-
Niederreiter, H.1
-
25
-
-
84942550998
-
Public-key cryptosystem based on discrete logarithm residues
-
Paillier P.: Public-key cryptosystem based on discrete logarithm residues. In: Eurocrypt '99, LNCS vol. 1592, pp. 223-238 (1999).
-
(1999)
Eurocrypt '99, LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
27
-
-
84957795480
-
Chosen-ciphertext security for any one-way cryptosystem
-
Pointcheval D.: Chosen-ciphertext security for any one-way cryptosystem. In: PKC '00, LNCS vol. 1751, pp. 129-146 (2000).
-
(2000)
PKC '00, LNCS
, vol.1751
, pp. 129-146
-
-
Pointcheval, D.1
-
28
-
-
0034226112
-
Finding the permutation between equivalent linear codes: The support splitting algorithm
-
4
-
Sendrier N. (2000). Finding the permutation between equivalent linear codes: the support splitting algorithm. IEEE Trans. Inform. Theory 46(4): 1193-1203
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 1193-1203
-
-
Sendrier, N.1
-
29
-
-
84880904783
-
OAEP reconsidered
-
Shoup V.: OAEP reconsidered. In: Crypto '01, LNCS vol. 2139, pp. 239-259 (2001).
-
(2001)
Crypto '01, LNCS
, vol.2139
, pp. 239-259
-
-
Shoup, V.1
-
30
-
-
84964937021
-
A method for finding codewords of small weight
-
Stern J.: A method for finding codewords of small weight. In: Coding Theory and Applications, LNCS vol. 388, pp. 106-113 (1989).
-
(1989)
Coding Theory and Applications, LNCS
, vol.388
, pp. 106-113
-
-
Stern, J.1
-
31
-
-
51349147944
-
Privacy enhanced and light weight RFID system without tag synchronization and exhaustive search
-
Suzuki M., Kobara K., Imai H.: Privacy enhanced and light weight RFID system without tag synchronization and exhaustive search. In: IEEE SMC (2006).
-
(2006)
IEEE SMC
-
-
Suzuki, M.1
Kobara, K.2
Imai, H.3
|