메뉴 건너뛰기




Volumn 3, Issue 2, 2010, Pages 129-140

Cryptanalysis of two McEliece cryptosystems based on Quasi-Cyclic codes

Author keywords

BCH codes; Cryptanalysis; LDPC codes; McEliece cryptosystem; Quasi cyclic codes

Indexed keywords


EID: 77952289695     PISSN: 16618270     EISSN: 16618289     Source Type: Journal    
DOI: 10.1007/s11786-009-0015-8     Document Type: Article
Times cited : (76)

References (27)
  • 1
    • 51649105649 scopus 로고    scopus 로고
    • Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC codes
    • Nice, France, March
    • Baldi, M., Chiaraluce, G. F.: Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC codes. In: IEEE International Symposium on Information Theory, pp. 2591-2595, Nice, France, March 2007.
    • (2007) IEEE International Symposium on Information Theory , pp. 2591-2595
    • Baldi, M.1    Chiaraluce, G.F.2
  • 2
    • 14844342361 scopus 로고    scopus 로고
    • How to mask the structure of codes for a cryptographic use
    • Berger T. P., Loidreau P.: How to mask the structure of codes for a cryptographic use. Des. Codes Cryptography 35(1), 63-79 (2005).
    • (2005) Des. Codes Cryptography , vol.35 , Issue.1 , pp. 63-79
    • Berger, T.P.1    Loidreau, P.2
  • 4
    • 56749164782 scopus 로고    scopus 로고
    • Attacking and defending the McEliece cryptosystem
    • Berstein, D. J., Lange, T., Peters, C.: Attacking and defending the McEliece cryptosystem. PQCrypto, pp. 31-46 (2008).
    • (2008) PQCrypto , pp. 31-46
    • Berstein, D.J.1    Lange, T.2    Peters, C.3
  • 5
    • 0031232428 scopus 로고    scopus 로고
    • The Magma algebra system I: The user language
    • Bosma W., Cannon J. J., Playoust C.: The Magma algebra system I: the user language. J. Symb. Comput. 24(3/4), 235-265 (1997).
    • (1997) J. Symb. Comput. , vol.24 , Issue.3-4 , pp. 235-265
    • Bosma, W.1    Cannon, J.J.2    Playoust, C.3
  • 6
    • 77952288288 scopus 로고
    • A further improvement of the work factor in an attempt at breaking McEliece's cryptosystem
    • INRIA
    • Canteaut, A., Chabanne, H.: A further improvement of the work factor in an attempt at breaking McEliece's cryptosystem. In: EUROCODE 94, pp. 169-173. INRIA (1994).
    • (1994) EUROCODE 94 , pp. 169-173
    • Canteaut, A.1    Chabanne, H.2
  • 8
    • 0031675932 scopus 로고    scopus 로고
    • A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
    • Canteaut A., Chabaud F.: A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511. IEEE Trans. Inf. Theory 44(1), 367-378 (1998).
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.1 , pp. 367-378
    • Canteaut, A.1    Chabaud, F.2
  • 10
    • 84858691417 scopus 로고    scopus 로고
    • A summary of McEliece-type cryptosystems and their security
    • Engelbert D., Overbeck R., Schmidt A.: A summary of McEliece-type cryptosystems and their security. J. Math. Cryptol. 1, 151-199 (2007).
    • (2007) J. Math. Cryptol. , vol.1 , pp. 151-199
    • Engelbert, D.1    Overbeck, R.2    Schmidt, A.3
  • 15
    • 85034651324 scopus 로고
    • An observation on the security of McEliece's public-key cryptosystem
    • 1988 of Lecture Notes in Computer Science, Springer, New York
    • Lee, P. J., Brickell, E. F.: An observation on the security of McEliece's public-key cryptosystem. In: Advances in Cryptology-EUROCRYPT'88, volume 330/1988 of Lecture Notes in Computer Science, pp. 275-280. Springer, New York (1988).
    • (1988) Advances in Cryptology-EUROCRYPT'88 , vol.330 , pp. 275-280
    • Lee, P.J.1    Brickell, E.F.2
  • 16
    • 0024078914 scopus 로고
    • A probabilistic algorithm for computing minimum weights of large error-correcting codes
    • Leon J. S.: A probabilistic algorithm for computing minimum weights of large error-correcting codes. IEEE Trans. Inf. Theory 34(5), 1354-1359 (1988).
    • (1988) IEEE Trans. Inf. Theory , vol.34 , Issue.5 , pp. 1354-1359
    • Leon, J.S.1
  • 17
    • 0028294826 scopus 로고
    • On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
    • Li Y. X., Deng R. H., Wang X.-M.: On the equivalence of McEliece's and Niederreiter's public-key cryptosystems. IEEE Trans. Inf. Theory 40(1), 271-273 (1994).
    • (1994) IEEE Trans. Inf. Theory , vol.40 , Issue.1 , pp. 271-273
    • Li, Y.X.1    Deng, R.H.2    Wang, X.-M.3
  • 20
    • 0022582790 scopus 로고
    • Knapsack-type cryptosystems and algebraic coding theory
    • Niederreiter H.: Knapsack-type cryptosystems and algebraic coding theory. Probl. Control Inf. Theory 15(2), 159-166 (1986).
    • (1986) Probl. Control Inf. Theory , vol.15 , Issue.2 , pp. 159-166
    • Niederreiter, H.1
  • 21
    • 0004247960 scopus 로고    scopus 로고
    • Pless, V. S., Huffman, W. C. (eds.), North Holland
    • Pless, V. S., Huffman, W. C. (eds.): Handbook of Coding Theory. North Holland (1998).
    • (1998) Handbook of Coding Theory
  • 22
    • 0032292220 scopus 로고    scopus 로고
    • On the concatenated structure of a linear code
    • Sendrier N.: On the concatenated structure of a linear code. AAECC 9(3), 221-242 (1998).
    • (1998) Aaecc , vol.9 , Issue.3 , pp. 221-242
    • Sendrier, N.1
  • 24
    • 0027983324 scopus 로고
    • A public-key cryptosystem based on binary Reed-Muller codes
    • Sidelnikov V. M.: A public-key cryptosystem based on binary Reed-Muller codes. Discrete Math. Appl. 4(3), 191-207 (1994).
    • (1994) Discrete Math. Appl. , vol.4 , Issue.3 , pp. 191-207
    • Sidelnikov, V.M.1
  • 25
    • 84929257781 scopus 로고
    • On the insecurity of cryptosystems based on generalized Reed-Solomon codes
    • Sidelnikov V. M., Shestakov S. O.: On the insecurity of cryptosystems based on generalized Reed-Solomon codes. Discrete Math. Appl. 1(4), 439-444 (1992).
    • (1992) Discrete Math. Appl. , vol.1 , Issue.4 , pp. 439-444
    • Sidelnikov, V.M.1    Shestakov, S.O.2
  • 27
    • 33745948777 scopus 로고    scopus 로고
    • An Attack on a Modified Niederreiter Encryption Scheme. Public Key Cryptography-PKC 2006
    • Springer, New York
    • Wieschebrink, C.: An Attack on a Modified Niederreiter Encryption Scheme. Public Key Cryptography-PKC 2006, Lecture Notes in Computer Science, vol. 3958/2006, pp. 14-26. Springer, New York (2006).
    • (2006) Lecture Notes in Computer Science , vol.2006-3958 , pp. 14-26
    • Wieschebrink, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.