메뉴 건너뛰기




Volumn 5867 LNCS, Issue , 2009, Pages 376-392

Compact McEliece keys from goppa codes

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC OPERATIONS; CRYPTOSYSTEMS; GOPPA CODES; KEY SIZES; MCELIECE; MCELIECE CRYPTOSYSTEM; PUBLIC KEYS;

EID: 70549109066     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-05445-7_24     Document Type: Conference Paper
Times cited : (116)

References (29)
  • 1
    • 51649105649 scopus 로고    scopus 로고
    • Cryptanalysis of a new instance of McEliece cryptosys-tem based on QC-LDPC code
    • Nice, France, pp, IEEE, Los Alamitos
    • Baldi, M., Chiaraluce, F.: Cryptanalysis of a new instance of McEliece cryptosys-tem based on QC-LDPC code. In: IEEE International Symposium on Information Theory - ISIT 2007, Nice, France, pp. 2591-2595. IEEE, Los Alamitos (2007)
    • (2007) IEEE International Symposium on Information Theory - ISIT , pp. 2591-2595
    • Baldi, M.1    Chiaraluce, F.2
  • 2
    • 52149114896 scopus 로고    scopus 로고
    • Baldi, M., Chiaraluce, F., Bodrato, M.: A new analysis of the mcEliece cryptosys-tem based on QC-LDPC codes. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, 5229, pp. 246-262. Springer, Heidelberg (2008)
    • Baldi, M., Chiaraluce, F., Bodrato, M.: A new analysis of the mcEliece cryptosys-tem based on QC-LDPC codes. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 246-262. Springer, Heidelberg (2008)
  • 3
    • 70350633827 scopus 로고    scopus 로고
    • Reducing key length of the McEliece cryptosystem
    • Preneel, B, ed, AFRICACRYPT 2009, Springer, Heidelberg
    • Berger, T.P., Cayrel, P.-L., Gaborit, P., Otmani, A.: Reducing key length of the McEliece cryptosystem. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 77-97. Springer, Heidelberg (2009), http://www.unilim.fr/pages- perso/philippe.gaborit/reducing.pdf
    • (2009) LNCS , vol.5580 , pp. 77-97
    • Berger, T.P.1    Cayrel, P.-L.2    Gaborit, P.3    Otmani, A.4
  • 5
    • 70549087069 scopus 로고    scopus 로고
    • Bernstein, D.J.: List decoding for binary Goppa codes (2008) (preprint), http://cr.yp.to/papers.html#goppalist
    • Bernstein, D.J.: List decoding for binary Goppa codes (2008) (preprint), http://cr.yp.to/papers.html#goppalist
  • 7
    • 56749164782 scopus 로고    scopus 로고
    • Attacking and defending the mcEliece cryp-tosystem
    • Buchmann, J, Ding, J, eds, PQCrypto 2008, Springer, Heidelberg
    • Bernstein, D.J., Lange, T., Peters, C.: Attacking and defending the mcEliece cryp-tosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008), http://www.springerlink.com/ content/68v69185x478p53g
    • (2008) LNCS , vol.5299 , pp. 31-46
    • Bernstein, D.J.1    Lange, T.2    Peters, C.3
  • 8
    • 51649128710 scopus 로고    scopus 로고
    • Shorter keys for code based cryptography
    • Bergen, Norway, pp, ACM Press, New York
    • Gaborit, P.: Shorter keys for code based cryptography. In: International Workshop on Coding and Cryptography - WCC 2005, Bergen, Norway, pp. 81-91. ACM Press, New York (2005)
    • (2005) International Workshop on Coding and Cryptography - WCC , pp. 81-91
    • Gaborit, P.1
  • 9
    • 51649094330 scopus 로고    scopus 로고
    • Lightweight code-based authentication and signature
    • Nice, France, pp, IEEE, Los Alamitos
    • Gaborit, P., Girault, M.: Lightweight code-based authentication and signature. In: IEEE International Symposium on Information Theory - ISIT 2007, Nice, France, pp. 191-195. IEEE, Los Alamitos (2007)
    • (2007) IEEE International Symposium on Information Theory - ISIT , pp. 191-195
    • Gaborit, P.1    Girault, M.2
  • 10
    • 0346827230 scopus 로고
    • Severely denting the Gabidulin version of the McEliece public key cryptosystem
    • Gibson, J.K.: Severely denting the Gabidulin version of the McEliece public key cryptosystem. Designs, Codes and Cryptography 6(1), 37-45 (1995)
    • (1995) Designs, Codes and Cryptography , vol.6 , Issue.1 , pp. 37-45
    • Gibson, J.K.1
  • 11
    • 84947917832 scopus 로고    scopus 로고
    • The security of the Gabidulin public key cryptosystem
    • Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
    • Gibson, J.K.: The security of the Gabidulin public key cryptosystem. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 212-223. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1070 , pp. 212-223
    • Gibson, J.K.1
  • 12
    • 0015630603 scopus 로고
    • Simple matrix-theory proof of the discrete dyadic convolution theorem
    • Gulamhusein, M.N.: Simple matrix-theory proof of the discrete dyadic convolution theorem. Electronics Letters 9(10), 238-239 (1973)
    • (1973) Electronics Letters , vol.9 , Issue.10 , pp. 238-239
    • Gulamhusein, M.N.1
  • 16
    • 70549103564 scopus 로고    scopus 로고
    • McEliece, R.: A public-key cryptosystem based on algebraic coding theory. The Deep Space Network Progress Report, DSN PR 42-44 (1978), http://ipnpr.jpl.nasa.gov/progressreport2/42-44/44N.PDF
    • McEliece, R.: A public-key cryptosystem based on algebraic coding theory. The Deep Space Network Progress Report, DSN PR 42-44 (1978), http://ipnpr.jpl.nasa.gov/progressreport2/42-44/44N.PDF
  • 17
    • 38749089099 scopus 로고    scopus 로고
    • Generalized compact knapsacks, cyclic lattices, and efficient oneway functions
    • Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient oneway functions. Computational Complexity 16(4), 365-411 (2007)
    • (2007) Computational Complexity , vol.16 , Issue.4 , pp. 365-411
    • Micciancio, D.1
  • 19
    • 0022582790 scopus 로고
    • Knapsack-type cryptosystems and algebraic coding theory
    • Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory 15(2), 159-166 (1986)
    • (1986) Problems of Control and Information Theory , vol.15 , Issue.2 , pp. 159-166
    • Niederreiter, H.1
  • 20
    • 70549084001 scopus 로고    scopus 로고
    • European Network of Excellence in Cryptology (ECRYPT). ECRYPT yearly report on algorithms and keysizes (2007-2008). D.SPA.28 Rev. 1.1, IST-2002-507932 ECRYPT, 07/2008 (2008), http://www.ecrypt.eu.org/ecrypt1/ documents/D.SPA.28-1.1.pdf
    • European Network of Excellence in Cryptology (ECRYPT). ECRYPT yearly report on algorithms and keysizes (2007-2008). D.SPA.28 Rev. 1.1, IST-2002-507932 ECRYPT, 07/2008 (2008), http://www.ecrypt.eu.org/ecrypt1/ documents/D.SPA.28-1.1.pdf
  • 21
    • 33751508709 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST). Recommendation for key management - part 1: General (2007), http://csrc.nist.gov/publications/ nistpubs/800-57/sp800-57-Part1-revised2-Mar08-2007.pdf
    • (2007) Recommendation for key management - part 1: General
  • 22
    • 70549096252 scopus 로고    scopus 로고
    • Otmani, A., Tillich, J.-P., Dallot, L.: Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes (2008) (preprint), http://arxiv.org/abs/0804.0409v2
    • Otmani, A., Tillich, J.-P., Dallot, L.: Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes (2008) (preprint), http://arxiv.org/abs/0804.0409v2
  • 24
  • 26
    • 0034226112 scopus 로고    scopus 로고
    • Finding the permutation between equivalent linear codes: The support splitting algorithm
    • Sendrier, N.: Finding the permutation between equivalent linear codes: the support splitting algorithm. IEEE Transactions on Information Theory 46(4), 1193-1203 (2000)
    • (2000) IEEE Transactions on Information Theory , vol.46 , Issue.4 , pp. 1193-1203
    • Sendrier, N.1
  • 27
    • 0348132167 scopus 로고
    • On cryptosystems based on generalized Reed-Solomon codes
    • Sidelnikov, V., Shestakov, S.: On cryptosystems based on generalized Reed-Solomon codes. Discrete Mathematics 4(3), 57-63 (1992)
    • (1992) Discrete Mathematics , vol.4 , Issue.3 , pp. 57-63
    • Sidelnikov, V.1    Shestakov, S.2
  • 29
    • 39049099966 scopus 로고    scopus 로고
    • Two NP-complete problems in coding theory with an application in code based cryptography
    • Seattle, USA, pp, IEEE, Los Alamitos
    • Wieschebrink, C.: Two NP-complete problems in coding theory with an application in code based cryptography. In: IEEE International Symposium on Information Theory - ISIT 2006, Seattle, USA, pp. 1733-1737. IEEE, Los Alamitos (2006)
    • (2006) IEEE International Symposium on Information Theory - ISIT , pp. 1733-1737
    • Wieschebrink, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.