-
1
-
-
51649105649
-
Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC codes
-
Nice, France, March
-
Baldi, M., Chiaraluce, G. F.: Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC codes. In: IEEE International Symposium on Information Theory, pp. 2591-2595, Nice, France, March 2007.
-
(2007)
IEEE International Symposium on Information Theory
, pp. 2591-2595
-
-
Baldi, M.1
Chiaraluce, G.F.2
-
2
-
-
14844342361
-
How to mask the structure of codes for a cryptographic use
-
Berger T. P., Loidreau P.: How to mask the structure of codes for a cryptographic use. Des. Codes Cryptography 35(1), 63-79 (2005).
-
(2005)
Des. Codes Cryptography
, vol.35
, Issue.1
, pp. 63-79
-
-
Berger, T.P.1
Loidreau, P.2
-
4
-
-
56749164782
-
Attacking and defending the McEliece cryptosystem
-
Berstein, D. J., Lange, T., Peters, C.: Attacking and defending the McEliece cryptosystem. PQCrypto, pp. 31-46 (2008).
-
(2008)
PQCrypto
, pp. 31-46
-
-
Berstein, D.J.1
Lange, T.2
Peters, C.3
-
5
-
-
0031232428
-
The Magma algebra system I: The user language
-
Bosma W., Cannon J. J., Playoust C.: The Magma algebra system I: the user language. J. Symb. Comput. 24(3/4), 235-265 (1997).
-
(1997)
J. Symb. Comput.
, vol.24
, Issue.3-4
, pp. 235-265
-
-
Bosma, W.1
Cannon, J.J.2
Playoust, C.3
-
6
-
-
77952288288
-
A further improvement of the work factor in an attempt at breaking McEliece's cryptosystem
-
INRIA
-
Canteaut, A., Chabanne, H.: A further improvement of the work factor in an attempt at breaking McEliece's cryptosystem. In: EUROCODE 94, pp. 169-173. INRIA (1994).
-
(1994)
EUROCODE 94
, pp. 169-173
-
-
Canteaut, A.1
Chabanne, H.2
-
8
-
-
0031675932
-
A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
-
Canteaut A., Chabaud F.: A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511. IEEE Trans. Inf. Theory 44(1), 367-378 (1998).
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.1
, pp. 367-378
-
-
Canteaut, A.1
Chabaud, F.2
-
9
-
-
38149131364
-
On Kabatianskii-Krouk-Smeets signatures
-
Springer Verlag Lecture Notes, Madrid, Spain, 21-22 June
-
Cayrel, P. L., Otmani, A., Vergnaud, D.: On Kabatianskii-Krouk-Smeets signatures. In: Proceedings of the First International Workshop on the Arithmetic of Finite Fields (WAIFI 2007). Springer Verlag Lecture Notes, pp. 237-251, Madrid, Spain, 21-22 June 2007.
-
(2007)
Proceedings of the First International Workshop on the Arithmetic of Finite Fields (WAIFI 2007)
, pp. 237-251
-
-
Cayrel, P.L.1
Otmani, A.2
Vergnaud, D.3
-
10
-
-
84858691417
-
A summary of McEliece-type cryptosystems and their security
-
Engelbert D., Overbeck R., Schmidt A.: A summary of McEliece-type cryptosystems and their security. J. Math. Cryptol. 1, 151-199 (2007).
-
(2007)
J. Math. Cryptol.
, vol.1
, pp. 151-199
-
-
Engelbert, D.1
Overbeck, R.2
Schmidt, A.3
-
13
-
-
51649094330
-
Lightweight code-based authentication and signature
-
Nice, France, March
-
Gaborit, P., Girault, M.: Lightweight code-based authentication and signature. In: IEEE International Symposium on Information Theory (ISIT 2007), pp. 191-195, Nice, France, March 2007.
-
(2007)
IEEE International Symposium on Information Theory (ISIT 2007)
, pp. 191-195
-
-
Gaborit, P.1
Girault, M.2
-
14
-
-
51649107860
-
Synd: A fast code-based stream cipher with a security reduction
-
Nice, France, March
-
Gaborit, P., Lauradoux, C., Sendrier, N.: Synd: a fast code-based stream cipher with a security reduction. In: IEEE International Symposium on Information Theory (ISIT 2007), pp. 186-190, Nice, France, March 2007.
-
(2007)
IEEE International Symposium on Information Theory (ISIT 2007)
, pp. 186-190
-
-
Gaborit, P.1
Lauradoux, C.2
Sendrier, N.3
-
15
-
-
85034651324
-
An observation on the security of McEliece's public-key cryptosystem
-
1988 of Lecture Notes in Computer Science, Springer, New York
-
Lee, P. J., Brickell, E. F.: An observation on the security of McEliece's public-key cryptosystem. In: Advances in Cryptology-EUROCRYPT'88, volume 330/1988 of Lecture Notes in Computer Science, pp. 275-280. Springer, New York (1988).
-
(1988)
Advances in Cryptology-EUROCRYPT'88
, vol.330
, pp. 275-280
-
-
Lee, P.J.1
Brickell, E.F.2
-
16
-
-
0024078914
-
A probabilistic algorithm for computing minimum weights of large error-correcting codes
-
Leon J. S.: A probabilistic algorithm for computing minimum weights of large error-correcting codes. IEEE Trans. Inf. Theory 34(5), 1354-1359 (1988).
-
(1988)
IEEE Trans. Inf. Theory
, vol.34
, Issue.5
, pp. 1354-1359
-
-
Leon, J.S.1
-
17
-
-
0028294826
-
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
-
Li Y. X., Deng R. H., Wang X.-M.: On the equivalence of McEliece's and Niederreiter's public-key cryptosystems. IEEE Trans. Inf. Theory 40(1), 271-273 (1994).
-
(1994)
IEEE Trans. Inf. Theory
, vol.40
, Issue.1
, pp. 271-273
-
-
Li, Y.X.1
Deng, R.H.2
Wang, X.-M.3
-
19
-
-
38049165687
-
Cryptanalysis of the Sidelnikov cryptosystem
-
Barcelona, Spain
-
Minder, L., Shokrollahi, A.: Cryptanalysis of the Sidelnikov cryptosystem. In: Eurocrypt 2007, Lecture Notes in Computer Science, vol. 4515, pp. 347-360, Barcelona, Spain (2007).
-
(2007)
Eurocrypt 2007, Lecture Notes in Computer Science
, vol.4515
, pp. 347-360
-
-
Minder, L.1
Shokrollahi, A.2
-
20
-
-
0022582790
-
Knapsack-type cryptosystems and algebraic coding theory
-
Niederreiter H.: Knapsack-type cryptosystems and algebraic coding theory. Probl. Control Inf. Theory 15(2), 159-166 (1986).
-
(1986)
Probl. Control Inf. Theory
, vol.15
, Issue.2
, pp. 159-166
-
-
Niederreiter, H.1
-
21
-
-
0004247960
-
-
Pless, V. S., Huffman, W. C. (eds.), North Holland
-
Pless, V. S., Huffman, W. C. (eds.): Handbook of Coding Theory. North Holland (1998).
-
(1998)
Handbook of Coding Theory
-
-
-
22
-
-
0032292220
-
On the concatenated structure of a linear code
-
Sendrier N.: On the concatenated structure of a linear code. AAECC 9(3), 221-242 (1998).
-
(1998)
Aaecc
, vol.9
, Issue.3
, pp. 221-242
-
-
Sendrier, N.1
-
23
-
-
0034448183
-
Using low density parity check codes in the McEliece cryptosystem
-
Sorrento, Italy
-
Shokrollahi, A., Monico, C., Rosenthal, J.: Using low density parity check codes in the McEliece cryptosystem. In: IEEE International Symposium on Information Theory (ISIT 2000), p. 215, Sorrento, Italy (2000).
-
(2000)
IEEE International Symposium on Information Theory (ISIT 2000)
, pp. 215
-
-
Shokrollahi, A.1
Monico, C.2
Rosenthal, J.3
-
24
-
-
0027983324
-
A public-key cryptosystem based on binary Reed-Muller codes
-
Sidelnikov V. M.: A public-key cryptosystem based on binary Reed-Muller codes. Discrete Math. Appl. 4(3), 191-207 (1994).
-
(1994)
Discrete Math. Appl.
, vol.4
, Issue.3
, pp. 191-207
-
-
Sidelnikov, V.M.1
-
25
-
-
84929257781
-
On the insecurity of cryptosystems based on generalized Reed-Solomon codes
-
Sidelnikov V. M., Shestakov S. O.: On the insecurity of cryptosystems based on generalized Reed-Solomon codes. Discrete Math. Appl. 1(4), 439-444 (1992).
-
(1992)
Discrete Math. Appl.
, vol.1
, Issue.4
, pp. 439-444
-
-
Sidelnikov, V.M.1
Shestakov, S.O.2
-
26
-
-
84964937021
-
A method for finding codewords of small weight
-
Cohen, G. D., Wolfmann, J. (eds.), Springer, New York
-
Stern, J.: A method for finding codewords of small weight. In: Cohen, G. D., Wolfmann, J. (eds.) Coding Theory and Applications, volume 388 of Lecture Notes in Computer Science, pp. 106-113. Springer, New York (1988).
-
(1988)
Coding Theory and Applications, Volume 388 of Lecture Notes in Computer Science
, pp. 106-113
-
-
Stern, J.1
-
27
-
-
33745948777
-
An Attack on a Modified Niederreiter Encryption Scheme. Public Key Cryptography-PKC 2006
-
Springer, New York
-
Wieschebrink, C.: An Attack on a Modified Niederreiter Encryption Scheme. Public Key Cryptography-PKC 2006, Lecture Notes in Computer Science, vol. 3958/2006, pp. 14-26. Springer, New York (2006).
-
(2006)
Lecture Notes in Computer Science
, vol.2006-3958
, pp. 14-26
-
-
Wieschebrink, C.1
|