-
1
-
-
51649105649
-
Cryptanalysis of a new instance of McEliece cryptosys-tem based on QC-LDPC codes
-
Nice, France, March
-
Baldi, M., Chiaraluce, G.F.: Cryptanalysis of a new instance of McEliece cryptosys-tem based on QC-LDPC codes. In: IEEE International Symposium on Information Theory, Nice, France, March 2007, pp. 2591-2595 (2007)
-
(2007)
IEEE International Symposium on Information Theory
, pp. 2591-2595
-
-
Baldi, M.1
Chiaraluce, G.F.2
-
2
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
Berlekamp, E., McEliece, R., van Tilborg, H.: On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory 24(3), 384-386 (1978)
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.3
, pp. 384-386
-
-
Berlekamp, E.1
McEliece, R.2
van Tilborg, H.3
-
3
-
-
56749164782
-
Attacking and defending the mceliece cryp-tosystem
-
Buchmann, J, Ding, J, eds, PQCrypto 2008, Springer, Heidelberg
-
Bernstein, D.J., Lange, T., Peters, C.: Attacking and defending the mceliece cryp-tosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5299
, pp. 31-46
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
4
-
-
56749156338
-
Mceliece cryptosystem implementation: Theory and practice
-
Buchmann, J, Ding, J, eds, PQCrypto 2008, Springer, Heidelberg
-
Biswas, B., Sendrier, N.: Mceliece cryptosystem implementation: theory and practice. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 47-62. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5299
, pp. 47-62
-
-
Biswas, B.1
Sendrier, N.2
-
5
-
-
0034448183
-
Using low density parity check codes in the McEliece cryptosystem
-
Sorrento, Italy, p
-
Shokrollahi, A., Monico, C., Rosenthal, J.: Using low density parity check codes in the McEliece cryptosystem. In: IEEE International Symposium on Information Theory (ISIT 2000), Sorrento, Italy, p. 215 (2000)
-
(2000)
IEEE International Symposium on Information Theory (ISIT
, pp. 215
-
-
Shokrollahi, A.1
Monico, C.2
Rosenthal, J.3
-
6
-
-
70350687696
-
-
Canteaut, A., Chabanne, H.: A further improvement of the work factor in an attempt at breaking McEliece's cryptosystem. In: EUROCODE 1994, pp. 169-173. INRIA (1994)
-
Canteaut, A., Chabanne, H.: A further improvement of the work factor in an attempt at breaking McEliece's cryptosystem. In: EUROCODE 1994, pp. 169-173. INRIA (1994)
-
-
-
-
7
-
-
0005071085
-
Improvements of the attacks on cryptosystems based on error-correcting codes
-
Technical Report 95-21, INRIA
-
Canteaut, A., Chabaud, F.: Improvements of the attacks on cryptosystems based on error-correcting codes. Technical Report 95-21, INRIA (1995)
-
(1995)
-
-
Canteaut, A.1
Chabaud, F.2
-
8
-
-
0031675932
-
A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
-
Canteaut, A., Chabaud, F.: A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511. IEEE Transactions on Information Theory 44(1), 367-378 (1998)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.1
, pp. 367-378
-
-
Canteaut, A.1
Chabaud, F.2
-
9
-
-
84947809062
-
Cryptanalysis of the original McEliece cryptosystem
-
Ohta, K, Pei, D, eds, ASIACRYPT 1998, Springer, Heidelberg
-
Canteaut, A., Sendrier, N.: Cryptanalysis of the original McEliece cryptosystem. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 187-199. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1514
, pp. 187-199
-
-
Canteaut, A.1
Sendrier, N.2
-
10
-
-
38149131364
-
On Kabatianskii-Krouk-Smeets Signatures
-
Carlet, C, Sunar, B, eds, WAIFI 2007, Springer, Heidelberg
-
Cayrel, P.L., Otmani, A., Vergnaud, D.: On Kabatianskii-Krouk-Smeets Signatures. In: Carlet, C., Sunar, B. (eds.) WAIFI 2007. LNCS, vol. 4547, pp. 237-251. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4547
, pp. 237-251
-
-
Cayrel, P.L.1
Otmani, A.2
Vergnaud, D.3
-
11
-
-
84858691417
-
A summary of McEliece-type cryptosystems and their security
-
Engelbert, D., Overbeck, R., Schmidt, A.: A summary of McEliece-type cryptosystems and their security. Journal of Mathematical Cryptology 1, 151-199 (2007)
-
(2007)
Journal of Mathematical Cryptology
, vol.1
, pp. 151-199
-
-
Engelbert, D.1
Overbeck, R.2
Schmidt, A.3
-
13
-
-
51649094330
-
Lightweight code-based authentication and signature
-
Nice, France, March, 2007
-
Gaborit, P., Girault, M.: Lightweight code-based authentication and signature. In: IEEE International Symposium on Information Theory (ISIT 2007), Nice, France, March 2007, pp. 191-195 (2007)
-
(2007)
IEEE International Symposium on Information Theory (ISIT
, pp. 191-195
-
-
Gaborit, P.1
Girault, M.2
-
14
-
-
51649107860
-
Synd: A fast code-based stream cipher with a security reduction
-
Nice, France, March, 2007
-
Gaborit, P., Lauradoux, C., Sendrier, N.: Synd: a fast code-based stream cipher with a security reduction. In: IEEE International Symposium on Information Theory (ISIT 2007), Nice, France, March 2007, pp. 186-190 (2007)
-
(2007)
IEEE International Symposium on Information Theory (ISIT
, pp. 186-190
-
-
Gaborit, P.1
Lauradoux, C.2
Sendrier, N.3
-
15
-
-
84947808606
-
-
Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A ring-based public key cryptosystem. In: Buhler, J. (ed.) ANTS 1998. LNCS, 1423, pp. 267-288. Springer, Heidelberg (1998)
-
Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A ring-based public key cryptosystem. In: Buhler, J. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267-288. Springer, Heidelberg (1998)
-
-
-
-
16
-
-
84937393537
-
-
Kobara, K., Imai, H.: Semantically secure mceliece public-key cryptosystems-conversions for mceliece pkc. In: Kim, K. (ed.) PKC 2001. LNCS, 1992, pp. 19-35. Springer, Heidelberg (2001)
-
Kobara, K., Imai, H.: Semantically secure mceliece public-key cryptosystems-conversions for mceliece pkc. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 19-35. Springer, Heidelberg (2001)
-
-
-
-
17
-
-
85034651324
-
An observation on the security of mcEliece's public-key cryptosystem
-
Günther, C.G, ed, EUROCRYPT 1988, Springer, Heidelberg
-
Lee, P.J., Brickell, E.F.: An observation on the security of mcEliece's public-key cryptosystem. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 275-280. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.330
, pp. 275-280
-
-
Lee, P.J.1
Brickell, E.F.2
-
18
-
-
0024078914
-
A probabilistic algorithm for computing minimum weights of large error-correcting codes
-
Leon, J.S.: A probabilistic algorithm for computing minimum weights of large error-correcting codes. IEEE Transactions on Information Theory 34(5), 1354-1359 (1988)
-
(1988)
IEEE Transactions on Information Theory
, vol.34
, Issue.5
, pp. 1354-1359
-
-
Leon, J.S.1
-
19
-
-
0028294826
-
On the equivalence of McEliece's and Niederre-iter's public-key cryptosystems
-
Li, Y.X., Deng, R.H., Wang, X.-M.: On the equivalence of McEliece's and Niederre-iter's public-key cryptosystems. IEEE Transactions on Information Theory 40(1), 271-273 (1994)
-
(1994)
IEEE Transactions on Information Theory
, vol.40
, Issue.1
, pp. 271-273
-
-
Li, Y.X.1
Deng, R.H.2
Wang, X.-M.3
-
21
-
-
70350670266
-
-
McEliece, R.J.: A Public-Key System Based on Algebraic Coding Theory, pp. 114-116. Jet Propulsion Lab. (1978); DSN Progress Report 44
-
McEliece, R.J.: A Public-Key System Based on Algebraic Coding Theory, pp. 114-116. Jet Propulsion Lab. (1978); DSN Progress Report 44
-
-
-
-
22
-
-
38049165687
-
Cryptanalysis of the Sidelnikov cryptosystem
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Minder, L., Shokrollahi, A.: Cryptanalysis of the Sidelnikov cryptosystem. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 347-360. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 347-360
-
-
Minder, L.1
Shokrollahi, A.2
-
23
-
-
0022582790
-
Knapsack-type cryptosystems and algebraic coding theory
-
Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Problems Control Inform. Theory 15(2), 159-166 (1986)
-
(1986)
Problems Control Inform. Theory
, vol.15
, Issue.2
, pp. 159-166
-
-
Niederreiter, H.1
-
25
-
-
0032292220
-
On the concatenated structure of a linear code
-
25
-
25. Sendrier, N.: On the concatenated structure of a linear code. Appl. Algebra Eng. Commun. Comput. (AAECC) 9(3), 221-242 (1998)
-
(1998)
Appl. Algebra Eng. Commun. Comput. (AAECC)
, vol.9
, Issue.3
, pp. 221-242
-
-
Sendrier, N.1
-
27
-
-
0027983324
-
A public-key cryptosystem based on binary Reed-Muller codes
-
Sidelnikov, V.M.: A public-key cryptosystem based on binary Reed-Muller codes. Discrete Mathematics and Applications 4(3) (1994)
-
(1994)
Discrete Mathematics and Applications
, vol.4
, Issue.3
-
-
Sidelnikov, V.M.1
-
28
-
-
84929257781
-
On the insecurity of cryptosystems based on generalized Reed-Solomon codes
-
Sidelnikov, V.M., Shestakov, S.O.: On the insecurity of cryptosystems based on generalized Reed-Solomon codes. Discrete Mathematics and Applications 1(4), 439-444 (1992)
-
(1992)
Discrete Mathematics and Applications
, vol.1
, Issue.4
, pp. 439-444
-
-
Sidelnikov, V.M.1
Shestakov, S.O.2
-
29
-
-
84964937021
-
A method for finding codewords of small weight
-
Cohen, G.D, Wolfmann, J, eds, Coding Theory 1988, Springer, Heidelberg
-
Stern, J.: A method for finding codewords of small weight. In: Cohen, G.D., Wolfmann, J. (eds.) Coding Theory 1988. LNCS, vol. 388, pp. 106-113. Springer, Heidelberg (1989)
-
(1989)
LNCS
, vol.388
, pp. 106-113
-
-
Stern, J.1
-
30
-
-
85031802472
-
On the mceliece public-key cryptosystem
-
Goldwasser, S, ed, CRYPTO 1988, Springer, Heidelberg
-
van Tilburg, J.: On the mceliece public-key cryptosystem. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 119-131. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.403
, pp. 119-131
-
-
van Tilburg, J.1
-
31
-
-
39049099966
-
-
Wieschebrink, C.: Two NP-complete problems in coding theory with an application in code based cryptography. In: IEEE International Symposium on Information Theory, July 2006, pp. 1733-1737 (2006)
-
Wieschebrink, C.: Two NP-complete problems in coding theory with an application in code based cryptography. In: IEEE International Symposium on Information Theory, July 2006, pp. 1733-1737 (2006)
-
-
-
|