-
1
-
-
0003777826
-
A Public Key Cryptosystem Based on Algebraic Coding Theory,
-
42- 44, Pasadena, CA, pp
-
R.J. McEliece, "A Public Key Cryptosystem Based on Algebraic Coding Theory," JPL DSN Progress Report 42- 44, Pasadena, CA, pp. 114-116, 1978.
-
(1978)
JPL DSN Progress Report
, pp. 114-116
-
-
McEliece, R.J.1
-
2
-
-
84935622001
-
Ideals over a Non-commutative Ring and Their Application in Cryptology
-
Advances in Cryptology, Eurocrypt'91, Editor: D.W. Davies, Berlin and Heidelberg: Springer-Verlag
-
E.M. Gabidulin, A.V. Paramonov, O.V. Tretjakov, "Ideals over a Non-commutative Ring and Their Application in Cryptology", in: Advances in Cryptology - Eurocrypt'91, Editor: D.W. Davies, Lecture Notes in Computer Science, No. 547, pp. 482-489, Berlin and Heidelberg: Springer-Verlag, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 482-489
-
-
Gabidulin, E.M.1
Paramonov, A.V.2
Tretjakov, O.V.3
-
3
-
-
34547326126
-
Public-Key Cryptosystems Based on Linear Codes over Large Alphabets: Efficiency and Weakness
-
Editor: P.G. Farrell, pp, Essex: Formara Limited
-
E.M. Gabidulin, "Public-Key Cryptosystems Based on Linear Codes over Large Alphabets: Efficiency and Weakness," in: Codes and Ciphers, Editor: P.G. Farrell, pp. 17- 32, Essex: Formara Limited, 1995.
-
(1995)
Codes and Ciphers
, pp. 17-32
-
-
Gabidulin, E.M.1
-
4
-
-
0346827230
-
Severely denting the Gabidulin version of the McEliece public key cryptosystem
-
J. K. Gibson, "Severely denting the Gabidulin version of the McEliece public key cryptosystem," // Designs, Codes and Cryptography, 6(1), 1995, pp. 37-45.
-
(1995)
Designs, Codes and Cryptography
, vol.6
, Issue.1
, pp. 37-45
-
-
Gibson, J.K.1
-
5
-
-
84947917832
-
-
J. K. Gibson, The security of the Gabidulin publickey cryptosystem, in: U. M. Maurer, ed. // Advances in Cryptology - EUROCRYPT'96, LNCS 1070, 1996, pp. 212-223.
-
J. K. Gibson, "The security of the Gabidulin publickey cryptosystem," in: U. M. Maurer, ed. // Advances in Cryptology - EUROCRYPT'96, LNCS 1070, 1996, pp. 212-223.
-
-
-
-
6
-
-
84888078698
-
-
E.M. Gabidulin, A.V. Ourivski, Improved GPT Public Key Cryptosystems. // In: P. Farrell, M. Darnell, B. Honary (Ed's), Coding, Communications, and Broadcasting, Research Studies Press, 2000, pp. 73-102.
-
E.M. Gabidulin, A.V. Ourivski, "Improved GPT Public Key Cryptosystems." // In: P. Farrell, M. Darnell, B. Honary (Ed's), "Coding, Communications, and Broadcasting", Research Studies Press, 2000, pp. 73-102.
-
-
-
-
8
-
-
0346076640
-
Reducible Rank Codes and Their Applications to Cryptography
-
E. M. Gabidulin, A. V. Ourivski, B. Honary, B. Ammar, "Reducible Rank Codes and Their Applications to Cryptography." // IEEE Transactions on Information Theory. 49(12): 3289-3293 (2003).
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.12
, pp. 3289-3293
-
-
Gabidulin, E.M.1
Ourivski, A.V.2
Honary, B.3
Ammar, B.4
-
9
-
-
84888077870
-
High-weight errors in public-key cryptosystems based on reducible rank codes
-
A. S. Kshevetskiy, E. M. Gabidulin, "High-weight errors in public-key cryptosystems based on reducible rank codes." // In: Proc. of ISCTA, 2005.
-
(2005)
Proc. of ISCTA
-
-
Kshevetskiy, A.S.1
Gabidulin, E.M.2
-
10
-
-
43949117635
-
A new brute-force attack for GPT and variants
-
Proc. of Mycrypt'2005, of, Springer-Verlag
-
R. Overbeck, "A new brute-force attack for GPT and variants." In: Proc. of Mycrypt'2005, vol. 3517 of LNCS, pp. 5-63, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3517
, pp. 5-63
-
-
Overbeck, R.1
-
11
-
-
43249125012
-
Brute-force attacks Public Key Cryptosystem Based on Gabidulin codes
-
Overbeck R., "Brute-force attacks Public Key Cryptosystem Based on Gabidulin codes." J. Cryptology, 21(2): 280- 301 (2008).
-
(2008)
J. Cryptology
, vol.21
, Issue.2
, pp. 280-301
-
-
Overbeck, R.1
-
12
-
-
43949122880
-
Attacks and counter-attacks on the GPT public key cryptosystem
-
August, Pp, Springer Netherlands, DOI 10.1007/s10623-007-9160-8
-
E. M. Gabidulin, "Attacks and counter-attacks on the GPT public key cryptosystem," Designs, Codes and Cryptography. V. 48, No. 2/ August 2008. Pp. 171-177, Springer Netherlands, DOI 10.1007/s10623-007-9160-8.
-
(2008)
Designs, Codes and Cryptography
, vol.48
, Issue.2
, pp. 171-177
-
-
Gabidulin, E.M.1
-
13
-
-
0021941233
-
Theory of Codes with Maximum Rank Distance
-
July
-
E.M. Gabidulin, "Theory of Codes with Maximum Rank Distance," Probl. Inform. Transm., vol. 21, No. 1, pp. 1- 12, July, 1985.
-
(1985)
Probl. Inform. Transm
, vol.21
, Issue.1
, pp. 1-12
-
-
Gabidulin, E.M.1
-
14
-
-
85013087026
-
A Fast Matrix Decoding Algorithm For Rank-Error-Correcting Codes
-
Eds G. Cohen, S. Litsyn, A. Lobstein, G. Zemor, Algebraic coding, pp, Springer-Verlag, Berlin
-
E. M. Gabidulin, "A Fast Matrix Decoding Algorithm For Rank-Error-Correcting Codes." In: (Eds G. Cohen, S. Litsyn, A. Lobstein, G. Zemor), Algebraic coding, pp. 126-132, Lecture Notes in Computer Science No. 573, Springer-Verlag, Berlin, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.573
, pp. 126-132
-
-
Gabidulin, E.M.1
-
15
-
-
0346196669
-
New technique for decoding codes in the rank metric and its cryptography applications
-
T. Johansson, A.V. Ourivski, "New technique for decoding codes in the rank metric and its cryptography applications," Problems Inform. Transm. 38(3), 237246 (2002).
-
(2002)
Problems Inform. Transm
, vol.38
, Issue.3
, pp. 237246
-
-
Johansson, T.1
Ourivski, A.V.2
-
16
-
-
51849145057
-
-
F. Levy-dit-Vehel1, J.-Ch. Jean-Charles Faug'ere, and L. Perret,Cryptanalysis of MinRank. Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17- 21, 2008, Proceedings. Series: Lecture Notes in Computer Science. Subseries: Security and Cryptology, 5157. Wagner, David (Ed.). 2008. Pp. 280-296.
-
F. Levy-dit-Vehel1, J.-Ch. Jean-Charles Faug'ere, and L. Perret,"Cryptanalysis of MinRank." Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17- 21, 2008, Proceedings. Series: Lecture Notes in Computer Science. Subseries: Security and Cryptology, Vol. 5157. Wagner, David (Ed.). 2008. Pp. 280-296.
-
-
-
|