-
1
-
-
51649105649
-
Cryptanalysis of a new instance of McEliece cryptosys-tem based on QC-LDPC code
-
Nice, France, pp, IEEE, Los Alamitos
-
Baldi, M., Chiaraluce, F.: Cryptanalysis of a new instance of McEliece cryptosys-tem based on QC-LDPC code. In: IEEE International Symposium on Information Theory - ISIT 2007, Nice, France, pp. 2591-2595. IEEE, Los Alamitos (2007)
-
(2007)
IEEE International Symposium on Information Theory - ISIT
, pp. 2591-2595
-
-
Baldi, M.1
Chiaraluce, F.2
-
2
-
-
52149114896
-
-
Baldi, M., Chiaraluce, F., Bodrato, M.: A new analysis of the mcEliece cryptosys-tem based on QC-LDPC codes. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, 5229, pp. 246-262. Springer, Heidelberg (2008)
-
Baldi, M., Chiaraluce, F., Bodrato, M.: A new analysis of the mcEliece cryptosys-tem based on QC-LDPC codes. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 246-262. Springer, Heidelberg (2008)
-
-
-
-
3
-
-
70350633827
-
Reducing key length of the McEliece cryptosystem
-
Preneel, B, ed, AFRICACRYPT 2009, Springer, Heidelberg
-
Berger, T.P., Cayrel, P.-L., Gaborit, P., Otmani, A.: Reducing key length of the McEliece cryptosystem. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 77-97. Springer, Heidelberg (2009), http://www.unilim.fr/pages- perso/philippe.gaborit/reducing.pdf
-
(2009)
LNCS
, vol.5580
, pp. 77-97
-
-
Berger, T.P.1
Cayrel, P.-L.2
Gaborit, P.3
Otmani, A.4
-
4
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
Berlekamp, E., McEliece, R., van Tilborg, H.: On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory 24(3), 384-386 (1978)
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.3
, pp. 384-386
-
-
Berlekamp, E.1
McEliece, R.2
van Tilborg, H.3
-
5
-
-
70549087069
-
-
Bernstein, D.J.: List decoding for binary Goppa codes (2008) (preprint), http://cr.yp.to/papers.html#goppalist
-
Bernstein, D.J.: List decoding for binary Goppa codes (2008) (preprint), http://cr.yp.to/papers.html#goppalist
-
-
-
-
6
-
-
70549108157
-
-
Springer, Heidelberg
-
Bernstein, D.J., Buchmann, J., Dahmen, E.: Post-Quantum Cryptography. Springer, Heidelberg (2008)
-
(2008)
Post-Quantum Cryptography
-
-
Bernstein, D.J.1
Buchmann, J.2
Dahmen, E.3
-
7
-
-
56749164782
-
Attacking and defending the mcEliece cryp-tosystem
-
Buchmann, J, Ding, J, eds, PQCrypto 2008, Springer, Heidelberg
-
Bernstein, D.J., Lange, T., Peters, C.: Attacking and defending the mcEliece cryp-tosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008), http://www.springerlink.com/ content/68v69185x478p53g
-
(2008)
LNCS
, vol.5299
, pp. 31-46
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
8
-
-
51649128710
-
Shorter keys for code based cryptography
-
Bergen, Norway, pp, ACM Press, New York
-
Gaborit, P.: Shorter keys for code based cryptography. In: International Workshop on Coding and Cryptography - WCC 2005, Bergen, Norway, pp. 81-91. ACM Press, New York (2005)
-
(2005)
International Workshop on Coding and Cryptography - WCC
, pp. 81-91
-
-
Gaborit, P.1
-
9
-
-
51649094330
-
Lightweight code-based authentication and signature
-
Nice, France, pp, IEEE, Los Alamitos
-
Gaborit, P., Girault, M.: Lightweight code-based authentication and signature. In: IEEE International Symposium on Information Theory - ISIT 2007, Nice, France, pp. 191-195. IEEE, Los Alamitos (2007)
-
(2007)
IEEE International Symposium on Information Theory - ISIT
, pp. 191-195
-
-
Gaborit, P.1
Girault, M.2
-
10
-
-
0346827230
-
Severely denting the Gabidulin version of the McEliece public key cryptosystem
-
Gibson, J.K.: Severely denting the Gabidulin version of the McEliece public key cryptosystem. Designs, Codes and Cryptography 6(1), 37-45 (1995)
-
(1995)
Designs, Codes and Cryptography
, vol.6
, Issue.1
, pp. 37-45
-
-
Gibson, J.K.1
-
11
-
-
84947917832
-
The security of the Gabidulin public key cryptosystem
-
Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
-
Gibson, J.K.: The security of the Gabidulin public key cryptosystem. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 212-223. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 212-223
-
-
Gibson, J.K.1
-
12
-
-
0015630603
-
Simple matrix-theory proof of the discrete dyadic convolution theorem
-
Gulamhusein, M.N.: Simple matrix-theory proof of the discrete dyadic convolution theorem. Electronics Letters 9(10), 238-239 (1973)
-
(1973)
Electronics Letters
, vol.9
, Issue.10
, pp. 238-239
-
-
Gulamhusein, M.N.1
-
14
-
-
0012052075
-
Some weak keys in McEliece public-key cryptosystem
-
Boston, USA, p, IEEE, Los Alamitos
-
Loidreau, P., Sendrier, N.: Some weak keys in McEliece public-key cryptosystem. In: IEEE International Symposium on Information Theory - ISIT 1998, Boston, USA, p. 382. IEEE, Los Alamitos (1998)
-
(1998)
IEEE International Symposium on Information Theory - ISIT
, pp. 382
-
-
Loidreau, P.1
Sendrier, N.2
-
16
-
-
70549103564
-
-
McEliece, R.: A public-key cryptosystem based on algebraic coding theory. The Deep Space Network Progress Report, DSN PR 42-44 (1978), http://ipnpr.jpl.nasa.gov/progressreport2/42-44/44N.PDF
-
McEliece, R.: A public-key cryptosystem based on algebraic coding theory. The Deep Space Network Progress Report, DSN PR 42-44 (1978), http://ipnpr.jpl.nasa.gov/progressreport2/42-44/44N.PDF
-
-
-
-
17
-
-
38749089099
-
Generalized compact knapsacks, cyclic lattices, and efficient oneway functions
-
Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient oneway functions. Computational Complexity 16(4), 365-411 (2007)
-
(2007)
Computational Complexity
, vol.16
, Issue.4
, pp. 365-411
-
-
Micciancio, D.1
-
18
-
-
0034448183
-
Using low density parity check codes in the McEliece cryptosystem
-
Sorrento, Italy, p, IEEE, Los Alamitos
-
Monico, C., Rosenthal, J., Shokrollahi, A.: Using low density parity check codes in the McEliece cryptosystem. In: IEEE International Symposium on Information Theory - ISIT 2000, Sorrento, Italy, p. 215. IEEE, Los Alamitos (2000)
-
(2000)
IEEE International Symposium on Information Theory - ISIT
, pp. 215
-
-
Monico, C.1
Rosenthal, J.2
Shokrollahi, A.3
-
19
-
-
0022582790
-
Knapsack-type cryptosystems and algebraic coding theory
-
Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory 15(2), 159-166 (1986)
-
(1986)
Problems of Control and Information Theory
, vol.15
, Issue.2
, pp. 159-166
-
-
Niederreiter, H.1
-
20
-
-
70549084001
-
-
European Network of Excellence in Cryptology (ECRYPT). ECRYPT yearly report on algorithms and keysizes (2007-2008). D.SPA.28 Rev. 1.1, IST-2002-507932 ECRYPT, 07/2008 (2008), http://www.ecrypt.eu.org/ecrypt1/ documents/D.SPA.28-1.1.pdf
-
European Network of Excellence in Cryptology (ECRYPT). ECRYPT yearly report on algorithms and keysizes (2007-2008). D.SPA.28 Rev. 1.1, IST-2002-507932 ECRYPT, 07/2008 (2008), http://www.ecrypt.eu.org/ecrypt1/ documents/D.SPA.28-1.1.pdf
-
-
-
-
21
-
-
33751508709
-
-
National Institute of Standards and Technology (NIST). Recommendation for key management - part 1: General (2007), http://csrc.nist.gov/publications/ nistpubs/800-57/sp800-57-Part1-revised2-Mar08-2007.pdf
-
(2007)
Recommendation for key management - part 1: General
-
-
-
22
-
-
70549096252
-
-
Otmani, A., Tillich, J.-P., Dallot, L.: Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes (2008) (preprint), http://arxiv.org/abs/0804.0409v2
-
Otmani, A., Tillich, J.-P., Dallot, L.: Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes (2008) (preprint), http://arxiv.org/abs/0804.0409v2
-
-
-
-
24
-
-
0017512185
-
On the complexity of decoding Goppa codes
-
Sarwate, D.V.: On the complexity of decoding Goppa codes. IEEE Transactions on Information Theory 23(4), 515-516 (1977)
-
(1977)
IEEE Transactions on Information Theory
, vol.23
, Issue.4
, pp. 515-516
-
-
Sarwate, D.V.1
-
26
-
-
0034226112
-
Finding the permutation between equivalent linear codes: The support splitting algorithm
-
Sendrier, N.: Finding the permutation between equivalent linear codes: the support splitting algorithm. IEEE Transactions on Information Theory 46(4), 1193-1203 (2000)
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1193-1203
-
-
Sendrier, N.1
-
27
-
-
0348132167
-
On cryptosystems based on generalized Reed-Solomon codes
-
Sidelnikov, V., Shestakov, S.: On cryptosystems based on generalized Reed-Solomon codes. Discrete Mathematics 4(3), 57-63 (1992)
-
(1992)
Discrete Mathematics
, vol.4
, Issue.3
, pp. 57-63
-
-
Sidelnikov, V.1
Shestakov, S.2
-
29
-
-
39049099966
-
Two NP-complete problems in coding theory with an application in code based cryptography
-
Seattle, USA, pp, IEEE, Los Alamitos
-
Wieschebrink, C.: Two NP-complete problems in coding theory with an application in code based cryptography. In: IEEE International Symposium on Information Theory - ISIT 2006, Seattle, USA, pp. 1733-1737. IEEE, Los Alamitos (2006)
-
(2006)
IEEE International Symposium on Information Theory - ISIT
, pp. 1733-1737
-
-
Wieschebrink, C.1
|