메뉴 건너뛰기




Volumn 5299 LNCS, Issue , 2008, Pages 47-62

McEliece cryptosystem implementation: Theory and practice

Author keywords

Code based cryptography; Cryptographic implementation; McEliece encryption scheme; Public key cryptosystem

Indexed keywords

NUMBER THEORY; QUANTUM CRYPTOGRAPHY;

EID: 56749156338     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88403-3_4     Document Type: Conference Paper
Times cited : (64)

References (19)
  • 1
    • 0001949079 scopus 로고    scopus 로고
    • Complexity issues in coding theory
    • Pless, V.S, Huffman, W.C, eds, I, pp, North-Holland, Amsterdam
    • Barg, A.: Complexity issues in coding theory. In: Pless, V.S., Huffman, W.C. (eds.) Handbook of Coding theory, eh. 7, vol. I, pp. 649-754. North-Holland, Amsterdam (1998)
    • (1998) Handbook of Coding theory, eh , vol.7 , pp. 649-754
    • Barg, A.1
  • 2
    • 84948986458 scopus 로고
    • Optimal asymetric encryption
    • De Santis, A, ed, EUROCRYPT, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Optimal asymetric encryption. In: De Santis, A. (ed.) EUROCRYPT 1994."LNCS, vol. 950, pp. 92-111. Springer, Heidelberg (1995)
    • (1994) LNCS , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 84968518238 scopus 로고
    • Factoring polynomials over large finite fields
    • Berlekamp, E.R.: Factoring polynomials over large finite fields. Mathematics of Computation 24(111), 713-715 (1970)
    • (1970) Mathematics of Computation , vol.24 , Issue.111 , pp. 713-715
    • Berlekamp, E.R.1
  • 5
    • 84958666890 scopus 로고    scopus 로고
    • Failure of the McEliece public-key cryptosystem under message-resend and related-message attack
    • Kalisky, B, ed, CRYPTO 1997, Springer, Heidelberg
    • Berson, T.: Failure of the McEliece public-key cryptosystem under message-resend and related-message attack. In: Kalisky, B. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 213-220. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 213-220
    • Berson, T.1
  • 6
    • 0031675932 scopus 로고    scopus 로고
    • A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
    • Canteaut, A., Chabaud, F.: A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511. IEEE Transactions on Information Theory 44(1), 367-378 (1998)
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.1 , pp. 367-378
    • Canteaut, A.1    Chabaud, F.2
  • 7
    • 84947809062 scopus 로고    scopus 로고
    • Cryptanalysis of the original McEliece cryptosystem
    • Ohta, K, Pei, D, eds, ASIACRYPT 1998, Springer, Heidelberg
    • Canteaut, A., Sendrier, N.: Cryptanalysis of the original McEliece cryptosystem. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 187-199. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1514 , pp. 187-199
    • Canteaut, A.1    Sendrier, N.2
  • 10
    • 0030871521 scopus 로고    scopus 로고
    • Factoring polynomials using binary representations of finite fields
    • Ganz, J.: Factoring polynomials using binary representations of finite fields. IEEE Transactions on Information Theory 43(1), 147-153 (1997)
    • (1997) IEEE Transactions on Information Theory , vol.43 , Issue.1 , pp. 147-153
    • Ganz, J.1
  • 11
    • 84958629363 scopus 로고    scopus 로고
    • Reaction attacks against several public-key cryptosystems
    • Varadharajan, V, Mu, Y, eds, ICICS 1999, Springer, Heidelberg
    • Hall, C., Goldberg, I., Schneier, B.: Reaction attacks against several public-key cryptosystems. In: Varadharajan, V., Mu, Y. (eds.) ICICS 1999. LNCS, vol. 1726, pp. 2-12. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1726 , pp. 2-12
    • Hall, C.1    Goldberg, I.2    Schneier, B.3
  • 12
    • 84937393537 scopus 로고    scopus 로고
    • Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems - Conversions for McEliece PKC. In: Kim, K. (ed.) PKC 2001. LNCS,1992, pp. 19-35. Springer, Heidelberg (2001)
    • Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems - Conversions for McEliece PKC. In: Kim, K. (ed.) PKC 2001. LNCS,"vol. 1992, pp. 19-35. Springer, Heidelberg (2001)
  • 13
    • 56749148587 scopus 로고    scopus 로고
    • McEliece, R.J.: A public-key ciyptosystem based on algebraic coding theory. In: DSN Prog. Rep., Jet Prop. Lab., California Inst. Technol., Pasadena, CA, pp. 114-116 (January 1978)
    • McEliece, R.J.: A public-key ciyptosystem based on algebraic coding theory. In: DSN Prog. Rep., Jet Prop. Lab., California Inst. Technol., Pasadena, CA, pp. 114-116 (January 1978)
  • 15
    • 84957795480 scopus 로고    scopus 로고
    • Pointcheval, D.: Chosen-ciphertext security for any one-way cryptosystem. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, 1751, pp. 129-146. Springer, Heidelberg (2000)
    • Pointcheval, D.: Chosen-ciphertext security for any one-way cryptosystem. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 129-146. Springer, Heidelberg (2000)
  • 16
    • 0034226112 scopus 로고    scopus 로고
    • Finding the permutation between equivalent codes: The support splitting algorithm
    • Sendrier, N.: Finding the permutation between equivalent codes: the support splitting algorithm. IEEE Transactions on Information Theory 46(4), 1193-1203 (2000)
    • (2000) IEEE Transactions on Information Theory , vol.46 , Issue.4 , pp. 1193-1203
    • Sendrier, N.1
  • 17
    • 56749098593 scopus 로고    scopus 로고
    • Cryptosystèmes à clé publique basés sur les codes correcteurs d'erreurs. Mémoire d'habilitation à diriger des recherches
    • March
    • Sendrier, N.: Cryptosystèmes à clé publique basés sur les codes correcteurs d'erreurs. Mémoire d'habilitation à diriger des recherches, Université Paris 6 (March 2002)
    • (2002) Université Paris , vol.6
    • Sendrier, N.1
  • 18
    • 56749098594 scopus 로고    scopus 로고
    • Sendrier, N.: Encoding information into constant weight words. In: IEEE Conference, ISIT 2005, pp. 435-438, Adelaide, Australia (September 2005)
    • Sendrier, N.: Encoding information into constant weight words. In: IEEE Conference, ISIT 2005, pp. 435-438, Adelaide, Australia (September 2005)
  • 19
    • 0033885534 scopus 로고    scopus 로고
    • Further cryptanalysis of the McEliece public-key cryptosystem
    • Sun, H.M.: Further cryptanalysis of the McEliece public-key cryptosystem. IEEE Trans. on communication letters 4(1), 18-19 (2000)
    • (2000) IEEE Trans. on communication letters , vol.4 , Issue.1 , pp. 18-19
    • Sun, H.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.