메뉴 건너뛰기




Volumn 5580 LNCS, Issue , 2009, Pages 77-97

Reducing key length of the McEliece Cryptosystem

Author keywords

Alternant code; McEliece cryptosystem; Public key cryptography; Quasi cyclic

Indexed keywords

ALTERNANT CODE; ALTERNANT CODES; COMPACT REPRESENTATION; DECISION PROBLEMS; DECODING ALGORITHM; ENCRYPTION AND DECRYPTION; GENERAL METHOD; LINEAR ERROR-CORRECTING CODES; MAXIMUM DISTANCE; MCELIECE CRYPTOSYSTEM; MDS CODE; NP COMPLETE; OPTIMAL CODES; POSSIBLE SOLUTIONS; PUBLIC KEY CRYPTOSYSTEMS; PUBLIC KEYS; QUASI-CYCLIC; QUASICYCLIC CODES; REED SOLOMON; RS CODES; SYNDROME DECODING;

EID: 70350633827     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-02384-2_6     Document Type: Conference Paper
Times cited : (151)

References (31)
  • 1
    • 51649105649 scopus 로고    scopus 로고
    • Cryptanalysis of a new instance of McEliece cryptosys-tem based on QC-LDPC codes
    • Nice, France, March
    • Baldi, M., Chiaraluce, G.F.: Cryptanalysis of a new instance of McEliece cryptosys-tem based on QC-LDPC codes. In: IEEE International Symposium on Information Theory, Nice, France, March 2007, pp. 2591-2595 (2007)
    • (2007) IEEE International Symposium on Information Theory , pp. 2591-2595
    • Baldi, M.1    Chiaraluce, G.F.2
  • 3
    • 56749164782 scopus 로고    scopus 로고
    • Attacking and defending the mceliece cryp-tosystem
    • Buchmann, J, Ding, J, eds, PQCrypto 2008, Springer, Heidelberg
    • Bernstein, D.J., Lange, T., Peters, C.: Attacking and defending the mceliece cryp-tosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5299 , pp. 31-46
    • Bernstein, D.J.1    Lange, T.2    Peters, C.3
  • 4
    • 56749156338 scopus 로고    scopus 로고
    • Mceliece cryptosystem implementation: Theory and practice
    • Buchmann, J, Ding, J, eds, PQCrypto 2008, Springer, Heidelberg
    • Biswas, B., Sendrier, N.: Mceliece cryptosystem implementation: theory and practice. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 47-62. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5299 , pp. 47-62
    • Biswas, B.1    Sendrier, N.2
  • 6
    • 70350687696 scopus 로고    scopus 로고
    • Canteaut, A., Chabanne, H.: A further improvement of the work factor in an attempt at breaking McEliece's cryptosystem. In: EUROCODE 1994, pp. 169-173. INRIA (1994)
    • Canteaut, A., Chabanne, H.: A further improvement of the work factor in an attempt at breaking McEliece's cryptosystem. In: EUROCODE 1994, pp. 169-173. INRIA (1994)
  • 7
    • 0005071085 scopus 로고
    • Improvements of the attacks on cryptosystems based on error-correcting codes
    • Technical Report 95-21, INRIA
    • Canteaut, A., Chabaud, F.: Improvements of the attacks on cryptosystems based on error-correcting codes. Technical Report 95-21, INRIA (1995)
    • (1995)
    • Canteaut, A.1    Chabaud, F.2
  • 8
    • 0031675932 scopus 로고    scopus 로고
    • A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
    • Canteaut, A., Chabaud, F.: A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511. IEEE Transactions on Information Theory 44(1), 367-378 (1998)
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.1 , pp. 367-378
    • Canteaut, A.1    Chabaud, F.2
  • 9
    • 84947809062 scopus 로고    scopus 로고
    • Cryptanalysis of the original McEliece cryptosystem
    • Ohta, K, Pei, D, eds, ASIACRYPT 1998, Springer, Heidelberg
    • Canteaut, A., Sendrier, N.: Cryptanalysis of the original McEliece cryptosystem. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 187-199. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1514 , pp. 187-199
    • Canteaut, A.1    Sendrier, N.2
  • 10
    • 38149131364 scopus 로고    scopus 로고
    • On Kabatianskii-Krouk-Smeets Signatures
    • Carlet, C, Sunar, B, eds, WAIFI 2007, Springer, Heidelberg
    • Cayrel, P.L., Otmani, A., Vergnaud, D.: On Kabatianskii-Krouk-Smeets Signatures. In: Carlet, C., Sunar, B. (eds.) WAIFI 2007. LNCS, vol. 4547, pp. 237-251. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4547 , pp. 237-251
    • Cayrel, P.L.1    Otmani, A.2    Vergnaud, D.3
  • 15
    • 84947808606 scopus 로고    scopus 로고
    • Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A ring-based public key cryptosystem. In: Buhler, J. (ed.) ANTS 1998. LNCS, 1423, pp. 267-288. Springer, Heidelberg (1998)
    • Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A ring-based public key cryptosystem. In: Buhler, J. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267-288. Springer, Heidelberg (1998)
  • 16
    • 84937393537 scopus 로고    scopus 로고
    • Kobara, K., Imai, H.: Semantically secure mceliece public-key cryptosystems-conversions for mceliece pkc. In: Kim, K. (ed.) PKC 2001. LNCS, 1992, pp. 19-35. Springer, Heidelberg (2001)
    • Kobara, K., Imai, H.: Semantically secure mceliece public-key cryptosystems-conversions for mceliece pkc. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 19-35. Springer, Heidelberg (2001)
  • 17
    • 85034651324 scopus 로고
    • An observation on the security of mcEliece's public-key cryptosystem
    • Günther, C.G, ed, EUROCRYPT 1988, Springer, Heidelberg
    • Lee, P.J., Brickell, E.F.: An observation on the security of mcEliece's public-key cryptosystem. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 275-280. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.330 , pp. 275-280
    • Lee, P.J.1    Brickell, E.F.2
  • 18
    • 0024078914 scopus 로고
    • A probabilistic algorithm for computing minimum weights of large error-correcting codes
    • Leon, J.S.: A probabilistic algorithm for computing minimum weights of large error-correcting codes. IEEE Transactions on Information Theory 34(5), 1354-1359 (1988)
    • (1988) IEEE Transactions on Information Theory , vol.34 , Issue.5 , pp. 1354-1359
    • Leon, J.S.1
  • 19
    • 0028294826 scopus 로고
    • On the equivalence of McEliece's and Niederre-iter's public-key cryptosystems
    • Li, Y.X., Deng, R.H., Wang, X.-M.: On the equivalence of McEliece's and Niederre-iter's public-key cryptosystems. IEEE Transactions on Information Theory 40(1), 271-273 (1994)
    • (1994) IEEE Transactions on Information Theory , vol.40 , Issue.1 , pp. 271-273
    • Li, Y.X.1    Deng, R.H.2    Wang, X.-M.3
  • 21
    • 70350670266 scopus 로고    scopus 로고
    • McEliece, R.J.: A Public-Key System Based on Algebraic Coding Theory, pp. 114-116. Jet Propulsion Lab. (1978); DSN Progress Report 44
    • McEliece, R.J.: A Public-Key System Based on Algebraic Coding Theory, pp. 114-116. Jet Propulsion Lab. (1978); DSN Progress Report 44
  • 22
    • 38049165687 scopus 로고    scopus 로고
    • Cryptanalysis of the Sidelnikov cryptosystem
    • Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
    • Minder, L., Shokrollahi, A.: Cryptanalysis of the Sidelnikov cryptosystem. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 347-360. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 347-360
    • Minder, L.1    Shokrollahi, A.2
  • 23
    • 0022582790 scopus 로고
    • Knapsack-type cryptosystems and algebraic coding theory
    • Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Problems Control Inform. Theory 15(2), 159-166 (1986)
    • (1986) Problems Control Inform. Theory , vol.15 , Issue.2 , pp. 159-166
    • Niederreiter, H.1
  • 25
    • 0032292220 scopus 로고    scopus 로고
    • On the concatenated structure of a linear code
    • 25
    • 25. Sendrier, N.: On the concatenated structure of a linear code. Appl. Algebra Eng. Commun. Comput. (AAECC) 9(3), 221-242 (1998)
    • (1998) Appl. Algebra Eng. Commun. Comput. (AAECC) , vol.9 , Issue.3 , pp. 221-242
    • Sendrier, N.1
  • 27
    • 0027983324 scopus 로고
    • A public-key cryptosystem based on binary Reed-Muller codes
    • Sidelnikov, V.M.: A public-key cryptosystem based on binary Reed-Muller codes. Discrete Mathematics and Applications 4(3) (1994)
    • (1994) Discrete Mathematics and Applications , vol.4 , Issue.3
    • Sidelnikov, V.M.1
  • 28
    • 84929257781 scopus 로고
    • On the insecurity of cryptosystems based on generalized Reed-Solomon codes
    • Sidelnikov, V.M., Shestakov, S.O.: On the insecurity of cryptosystems based on generalized Reed-Solomon codes. Discrete Mathematics and Applications 1(4), 439-444 (1992)
    • (1992) Discrete Mathematics and Applications , vol.1 , Issue.4 , pp. 439-444
    • Sidelnikov, V.M.1    Shestakov, S.O.2
  • 29
    • 84964937021 scopus 로고
    • A method for finding codewords of small weight
    • Cohen, G.D, Wolfmann, J, eds, Coding Theory 1988, Springer, Heidelberg
    • Stern, J.: A method for finding codewords of small weight. In: Cohen, G.D., Wolfmann, J. (eds.) Coding Theory 1988. LNCS, vol. 388, pp. 106-113. Springer, Heidelberg (1989)
    • (1989) LNCS , vol.388 , pp. 106-113
    • Stern, J.1
  • 30
    • 85031802472 scopus 로고
    • On the mceliece public-key cryptosystem
    • Goldwasser, S, ed, CRYPTO 1988, Springer, Heidelberg
    • van Tilburg, J.: On the mceliece public-key cryptosystem. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 119-131. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.403 , pp. 119-131
    • van Tilburg, J.1
  • 31
    • 39049099966 scopus 로고    scopus 로고
    • Wieschebrink, C.: Two NP-complete problems in coding theory with an application in code based cryptography. In: IEEE International Symposium on Information Theory, July 2006, pp. 1733-1737 (2006)
    • Wieschebrink, C.: Two NP-complete problems in coding theory with an application in code based cryptography. In: IEEE International Symposium on Information Theory, July 2006, pp. 1733-1737 (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.