-
1
-
-
72449140818
-
-
+08] Augot, D., Finiasz, M., Gaborit, P., Manuel, S., Sendrier, N.: Fast syndrome-based hash function. SHA-3 Proposal: FSB (2008), http://www-roc.inria.fr/secret/CBCrypto/index.php?fsb
-
+08] Augot, D., Finiasz, M., Gaborit, P., Manuel, S., Sendrier, N.: Fast syndrome-based hash function. SHA-3 Proposal: FSB (2008), http://www-roc.inria.fr/secret/CBCrypto/index.php?pg=fsb
-
-
-
-
3
-
-
56749180648
-
A new efficient threshold ring signature scheme based on coding theory
-
AMCG08, Buchmann, J, Ding, J, eds, PQCrypto 2008, Springer, Heidelberg
-
[AMCG08] Aguilar Melchor, C., Cayrel, P.L., Gaborit, P.: A new efficient threshold ring signature scheme based on coding theory. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5299
, pp. 31-46
-
-
Aguilar Melchor, C.1
Cayrel, P.L.2
Gaborit, P.3
-
4
-
-
70350633827
-
Reducing key length of the McEliece cryptosystem
-
BCGO09, Preneel, B, ed, AFRICACRYPT 2009, Springer, Heidelberg
-
[BCGO09] Berger, T., Cayrel, P.L., Gaborit, P., Otmani, A.: Reducing key length of the McEliece cryptosystem. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 60-76. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5580
, pp. 60-76
-
-
Berger, T.1
Cayrel, P.L.2
Gaborit, P.3
Otmani, A.4
-
5
-
-
33745561884
-
-
[BKM06] Bender, A., Katz, J., Morselli, R.: Ring signatures: Stronger definitions, and constructions without random oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 60-79. Springer, Heidelberg (2006)
-
[BKM06] Bender, A., Katz, J., Morselli, R.: Ring signatures: Stronger definitions, and constructions without random oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 60-79. Springer, Heidelberg (2006)
-
-
-
-
6
-
-
56749164782
-
Attacking and defending the McEliece cryptosystem
-
BLP08, Buchmann, J, Ding, J, eds, PQCrypto 2008, Springer, Heidelberg
-
[BLP08] Bernstein, J., Lange, T., Peters, C.: Attacking and defending the McEliece cryptosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5299
, pp. 31-46
-
-
Bernstein, J.1
Lange, T.2
Peters, C.3
-
9
-
-
84937420077
-
Threshold ring signatures and applications to ad-hoc groups
-
BSS02, Yung,M, ed, CRYPTO 2002, Springer, Heidelberg
-
[BSS02] Bresson, E., Stern, J., Szydlo, M.: Threshold ring signatures and applications to ad-hoc groups. In: Yung,M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 465-480. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
10
-
-
84929461941
-
How to achieve a McEliece-based digital signature scheme
-
CFS01, Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
[CFS01] Courtois, N., Finiasz, M., Sendrier, N.: How to achieve a McEliece-based digital signature scheme. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 157-174. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 157-174
-
-
Courtois, N.1
Finiasz, M.2
Sendrier, N.3
-
11
-
-
4243180376
-
The random oracle methodology, revisited
-
CGH04
-
[CGH04] Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. Journal of the ACM 51(4), 557-594 (2004)
-
(2004)
Journal of the ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
12
-
-
38149083391
-
Ring signatures of sub-linear size without random oracles
-
CGS07, Arge, L, Cachin, C, Jurdziński, T, Tarlecki, A, eds, ICALP 2007, Springer, Heidelberg
-
[CGS07] Chandran, N., Groth, J., Sahai, A.: Ring signatures of sub-linear size without random oracles. In: Arge, L., Cachin, C., Jurdziński, T., Tarlecki, A. (eds.) ICALP 2007. LNCS, vol. 4596, pp. 423-434. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4596
, pp. 423-434
-
-
Chandran, N.1
Groth, J.2
Sahai, A.3
-
13
-
-
38149131364
-
On Kabatianskii-Krouk- Smeets signatures
-
COV07, Carlet, C, Sunar, B, eds, WAIFI 2007, Springer, Heidelberg
-
[COV07] Cayrel, P.L., Otmani, A., Vergnaud, D.: On Kabatianskii-Krouk- Smeets signatures. In: Carlet, C., Sunar, B. (eds.) WAIFI 2007. LNCS, vol. 4547, pp. 237-251. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4547
, pp. 237-251
-
-
Cayrel, P.L.1
Otmani, A.2
Vergnaud, D.3
-
14
-
-
51849085606
-
The random oracle model and the ideal cipher model are equivalent
-
CPS08, Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
-
[CPS08] Coron, J.-S., Patarin, J., Seurin, Y.: The random oracle model and the ideal cipher model are equivalent. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 1-20. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 1-20
-
-
Coron, J.-S.1
Patarin, J.2
Seurin, Y.3
-
15
-
-
85024290278
-
Group signatures
-
CvH92, Davies, D.W, ed, EUROCRYPT 1991, Springer, Heidelberg
-
[CvH92] Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
van Heyst, E.2
-
16
-
-
70349873550
-
-
[Dal08] Dallot, L.: Towards a concrete security proof of Courtois, Finiasz and Sendrier signature scheme. In: Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) WEWoRC 2007. LNCS, 4945, pp. 65-77. Springer, Heidelberg (2008)
-
[Dal08] Dallot, L.: Towards a concrete security proof of Courtois, Finiasz and Sendrier signature scheme. In: Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) WEWoRC 2007. LNCS, vol. 4945, pp. 65-77. Springer, Heidelberg (2008)
-
-
-
-
17
-
-
0017018484
-
New directions in cryptography
-
DH76
-
[DH76] Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inform. Th. 22(6), 644-654 (1976)
-
(1976)
IEEE Trans. Inform. Th
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
18
-
-
35048854233
-
Anonymous identification in ad-hoc groups
-
DKNS04, Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
[DKNS04] Dodis, Y., Kiayias, A., Nicolosi, A., Shoup, V.: Anonymous identification in ad-hoc groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 609-626. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 609-626
-
-
Dodis, Y.1
Kiayias, A.2
Nicolosi, A.3
Shoup, V.4
-
19
-
-
72449174805
-
Security bounds for the design of code-based cryptosystems
-
FS09, Matsui, M, ed, ASIACRYPT 2009, Springer, Heidelberg
-
[FS09] Finiasz, M., Sendrier, N.: Security bounds for the design of code-based cryptosystems. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 88-105. Springer, Heidelberg (2009), http://eprint.iacr.org/2009/414
-
(2009)
LNCS
, vol.5912
, pp. 88-105
-
-
Finiasz, M.1
Sendrier, N.2
-
20
-
-
84927752554
-
Desingated verifier proofs and their applications
-
JSI96, Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
-
[JSI96] Jakobson, M., Sako, K., Implagliazzo, R.: Desingated verifier proofs and their applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143-154. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 143-154
-
-
Jakobson, M.1
Sako, K.2
Implagliazzo, R.3
-
21
-
-
84937393537
-
-
[KI01] Kobara, K., Imai, I.: Semantically secure McEliece public-key cryptosystems - conversions for McEliece PKC. In: Kim, K.-c. (ed.) PKC 2001. LNCS, 1992, pp. 19-35. Springer, Heidelberg (2001)
-
[KI01] Kobara, K., Imai, I.: Semantically secure McEliece public-key cryptosystems - conversions for McEliece PKC. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 19-35. Springer, Heidelberg (2001)
-
-
-
-
22
-
-
70350336456
-
On bounded distance decoding, unique shortest vectors, and the minimum distance problem
-
LM09, Tai, X.-C, et al, eds, CRYPTO 2009, Springer, Heidelberg
-
[LM09] Lyubashevsky, V., Micciancio, D.: On bounded distance decoding, unique shortest vectors, and the minimum distance problem. In: Tai, X.-C., et al. (eds.) CRYPTO 2009. LNCS, vol. 5677, pp. 577-594. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 577-594
-
-
Lyubashevsky, V.1
Micciancio, D.2
-
23
-
-
70350344293
-
How risky is the random-oracle model?
-
LN09, Halevi, S, ed, CRYPTO 2009, Springer, Heidelberg
-
[LN09] Leurent, G., Nguyen, P.Q.: How risky is the random-oracle model? In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 445-464. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 445-464
-
-
Leurent, G.1
Nguyen, P.Q.2
-
24
-
-
0035270825
-
Weak keys in McEliece public-key cryptosystem
-
LS01
-
[LS01] Loidreau, P., Sendrier, N.:Weak keys in McEliece public-key cryptosystem. IEEE Trans. Inform. Th. 47(3), 1207-1212 (2001)
-
(2001)
IEEE Trans. Inform. Th
, vol.47
, Issue.3
, pp. 1207-1212
-
-
Loidreau, P.1
Sendrier, N.2
-
25
-
-
77954611855
-
Compact McEliece keys from goppa codes. Cryptology ePrint Archive
-
MB09, Report 2009/187
-
[MB09] Misoczki, R., Barreto, P.S.L.M.: Compact McEliece keys from goppa codes. Cryptology ePrint Archive, Report 2009/187 (2009), http://eprint.iacr. org/
-
(2009)
-
-
Misoczki, R.1
Barreto, P.S.L.M.2
-
26
-
-
0003777826
-
A public-key cryptosystem based on algebraic coding theory. Technical report, DSN Progress report # 42-44
-
McE78, Jet Propulsion Laboratory, Pasadena, Californila 1978
-
[McE78] McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Technical report, DSN Progress report # 42-44, Jet Propulsion Laboratory, Pasadena, Californila (1978)
-
-
-
McEliece, R.J.1
-
27
-
-
79960836060
-
Deniable ring authentification
-
Nao02, Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
[Nao02] Naor, M.: Deniable ring authentification. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 481-498. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 481-498
-
-
Naor, M.1
-
28
-
-
72449164289
-
Cryptanalysis of a McEliece cryptosystem based on quasi-cyclic LDPC codes
-
OTD08, Faugre, J.C, Wang, D, eds
-
[OTD08] Otmani, A., Tillich, J.P., Dallot, L.: Cryptanalysis of a McEliece cryptosystem based on quasi-cyclic LDPC codes. In: Faugre, J.C., Wang, D. (eds.) Proceedings of the first international conference on symbolic computation and cryptography. LMIB, pp. 69-81 (2008)
-
(2008)
Proceedings of the first international conference on symbolic computation and cryptography. LMIB
, pp. 69-81
-
-
Otmani, A.1
Tillich, J.P.2
Dallot, L.3
-
29
-
-
84946833891
-
How to leak a secret
-
RST01, Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
[RST01] Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552-565. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
30
-
-
0034226112
-
Finding the permutation between equivalent codes: The support splitting algorithm
-
Sen00
-
[Sen00] Sendrier, N.: Finding the permutation between equivalent codes: the support splitting algorithm. IEEE Trans. Inform. Th. 46, 1193-1203 (2000)
-
(2000)
IEEE Trans. Inform. Th
, vol.46
, pp. 1193-1203
-
-
Sendrier, N.1
-
31
-
-
70349884651
-
-
Sen02, Université Pierre et Marie Curie, Paris 6, Paris, France, Mars , in French
-
[Sen02] Sendrier, N.: Cryptosystèmes à clé publique basés sur les codes correcteurs d'erreurs. Habilitation à diriger les recherches, Université Pierre et Marie Curie, Paris 6, Paris, France, Mars (2002) (in French)
-
(2002)
Cryptosystèmes à clé publique basés sur les codes correcteurs d'erreurs. Habilitation à diriger les recherches
-
-
Sendrier, N.1
-
32
-
-
0018545449
-
How to share a secret
-
Sha79
-
[Sha79] Shamir, A.: How to share a secret. Commun. of the ACM 22(11), 612-613 (1979)
-
(1979)
Commun. of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
33
-
-
84955606497
-
An alternative to the Fiat-Shamir protocol
-
Ste90, Quisquater, J.-J, Vandewalle, J, eds, EUROCRYPT 1989, Springer, Heidelberg
-
[Ste90] Stern, J.: An alternative to the Fiat-Shamir protocol. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 173-180. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.434
, pp. 173-180
-
-
Stern, J.1
-
34
-
-
0030283873
-
A new paradigm for public key identification
-
Ste96
-
[Ste96] Stern, J.: A new paradigm for public key identification. IEEE Trans. Inform. Th. 42(6), 1757-1768 (1996)
-
(1996)
IEEE Trans. Inform. Th
, vol.42
, Issue.6
, pp. 1757-1768
-
-
Stern, J.1
-
35
-
-
36049024799
-
-
[SW07] Shacham, H., Waters, B.: Efficient ring signatures without random oracles. In: Okamoto, T.,Wang, X. (eds.) PKC 2007. LNCS, 4450, pp. 166-180. Springer, Heidelberg (2007)
-
[SW07] Shacham, H., Waters, B.: Efficient ring signatures without random oracles. In: Okamoto, T.,Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 166-180. Springer, Heidelberg (2007)
-
-
-
-
36
-
-
56749122357
-
Code-based ring signature scheme
-
ZLC07
-
[ZLC07] Zheng, D., Li, X., Chen, K.: Code-based ring signature scheme. International Journal of Network Security 5(2), 154-157 (2007)
-
(2007)
International Journal of Network Security
, vol.5
, Issue.2
, pp. 154-157
-
-
Zheng, D.1
Li, X.2
Chen, K.3
|