-
1
-
-
33646171290
-
-
D. Augot, M. Finiasz and N. Sendrier, A family of fast syndrome based cryptographic hash functions, In MyCrypt 2005, LNCS 3715, (2005), p. 64-83.
-
D. Augot, M. Finiasz and N. Sendrier, A family of fast syndrome based cryptographic hash functions, In MyCrypt 2005, LNCS 3715, (2005), p. 64-83.
-
-
-
-
2
-
-
0001949079
-
Complexity issues in coding theory
-
V. S. Pless and W. C. Huffman, editors, chapter 7, North-Holland
-
A. Barg. Complexity issues in coding theory. In V. S. Pless and W. C. Huffman, editors, Handbook of Coding theory, volume I, chapter 7, pages 649-754. North-Holland, 1998.
-
(1998)
Handbook of Coding theory
, vol.1
, pp. 649-754
-
-
Barg, A.1
-
3
-
-
33746077698
-
A practical stream cipher with provable security
-
QUAD:, Serge Vaudenay, editor, Advances in Cryptology, EURO CRYPT 2006, number in, Springer-Verlag
-
C. Berbain, H. Gilbert and J. Patarin, QUAD: A practical stream cipher with provable security. In Serge Vaudenay, editor, Advances in Cryptology - EURO CRYPT 2006, number 4004 in LNCS, pages 109-128. Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.4004
, pp. 109-128
-
-
Berbain, C.1
Gilbert, H.2
Patarin, J.3
-
5
-
-
0022716288
-
A simple unpredictable pseudo-random number generator
-
L. Blum, M. Blum and M. Shub, A simple unpredictable pseudo-random number generator, SIAM J. comput. 15(2), (1986), p. 164-383.
-
(1986)
SIAM J. comput
, vol.15
, Issue.2
, pp. 164-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
6
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudorandom bits
-
M. Blum and S. Micali, How to generate cryptographically strong sequences of pseudorandom bits, SIAM J. Comput., 15(2),(1984), p. 850-864.
-
(1984)
SIAM J. Comput
, vol.15
, Issue.2
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
7
-
-
0031675932
-
A new algorithm for finding minimum-weight words in a linear code: Application to primitive narrow-sense BCH codes of length - 511
-
A. Canteaut and F. Chabaud. A new algorithm for finding minimum-weight words in a linear code: application to primitive narrow-sense BCH codes of length - 511. IEEE Transactions on Information Theory, IT-44(1998), 367-378.
-
(1998)
IEEE Transactions on Information Theory
, vol.IT-44
, pp. 367-378
-
-
Canteaut, A.1
Chabaud, F.2
-
9
-
-
33646172531
-
Cryptanalysis of a provably secure cryptographic hash function
-
J.-S. Coron and A. Joux. Cryptanalysis of a provably secure cryptographic hash function. Cryptology ePrint Archive, 2004. http://eprint iacr.org/2004/013/.
-
(2004)
Cryptology ePrint Archive
-
-
Coron, J.-S.1
Joux, A.2
-
12
-
-
34547440660
-
Asymptotic improvement of the Gilbert-Varshamov bound for linear codes
-
Seattle, USA
-
P. Gaborit and G. Zémor, Asymptotic improvement of the Gilbert-Varshamov bound for linear codes, Proceedings of ISIT 2006, Seattle, USA (2006), 287-291.
-
(2006)
Proceedings of ISIT
, pp. 287-291
-
-
Gaborit, P.1
Zémor, G.2
-
13
-
-
0024868772
-
Hard core predicate for any one-way function
-
ACM press p
-
O. Goldreich and L. Levin, Hard core predicate for any one-way function. In Proc of STOC'89, ACM press p. 25-32.
-
Proc of STOC'89
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.2
-
15
-
-
0345253860
-
Pseudo-random generator from one-way functions
-
J. Hastad, R. Impagliazzo,L. Levin and M. Luby, Pseudo-random generator from one-way functions, SIAM J. Comput., 28(4), (1999), p. 1364-1396.
-
(1999)
SIAM J. Comput
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
16
-
-
0001143795
-
Efficient cryptographic schemes provably as secure as subset sum
-
R. Impagliazzo and M. Naor, Efficient cryptographic schemes provably as secure as subset sum, J. Cryptology, 9(4), 199-216 (1999).
-
(1999)
J. Cryptology
, vol.9
, Issue.4
, pp. 199-216
-
-
Impagliazzo, R.1
Naor, M.2
-
17
-
-
0022663555
-
Average case complete problems
-
L. Levin. Average case complete problems. SIAM Journal on Computing, 15(l):285-286, 1986.
-
(1986)
SIAM Journal on Computing
, vol.15
, Issue.L
, pp. 285-286
-
-
Levin, L.1
-
18
-
-
0003777826
-
A public-key cryptosystem based on algebraic coding theory,
-
42-44, 114-116
-
RJ. McEliece, "A public-key cryptosystem based on algebraic coding theory," JPL DSN Progress Report 42-44, 114-116 (1978).
-
(1978)
JPL DSN Progress Report
-
-
McEliece, R.J.1
-
20
-
-
0037503271
-
Limit distributions of the minimum distance of random linear codes
-
J. N. Pierce, Limit distributions of the minimum distance of random linear codes, IEEE Trans. Inf. theory, Vol IT-13 (1967), pp. 595-599.
-
(1967)
IEEE Trans. Inf. theory
, vol.IT-13
, pp. 595-599
-
-
Pierce, J.N.1
-
22
-
-
70449478600
-
Encoding information into constant weight words
-
Adelaide, Australia, September
-
N. Sendrier. Encoding information into constant weight words. In IEEE Conference, ISTT'2005, Adelaide, Australia, September 2005.
-
(2005)
IEEE Conference, ISTT'2005
-
-
Sendrier, N.1
-
23
-
-
84937428040
-
A generalized birthday problem
-
M. Yung, editor, CRYPTO'02, number in, Springer-Verlag
-
D. Wagner. A generalized birthday problem. In M. Yung, editor, CRYPTO'02, number 2442 in LNCS, pages 288-303. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 288-303
-
-
Wagner, D.1
|