-
1
-
-
70350633827
-
Reducing key length of the McEliece cryptosystem
-
Preneel, B. (ed.) Progress in Cryptology - AFRICACRYPT 2009. Springer, Heidelberg
-
Berger, T.P., Cayrel, P.-L., Gaborit, P., Otmani, A.: Reducing key length of the McEliece cryptosystem. In: Preneel, B. (ed.) Progress in Cryptology - AFRICACRYPT 2009. LNCS, vol. 5580, pp. 77-97. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5580
, pp. 77-97
-
-
Berger, T.P.1
Cayrel, P.-L.2
Gaborit, P.3
Otmani, A.4
-
2
-
-
14844342361
-
How to mask the structure of codes for a cryptographic use
-
Berger, T.P., Loidreau, P.: How to mask the structure of codes for a cryptographic use. Designs, Codes and Cryptography 35(1), 63-79 (2005)
-
(2005)
Designs, Codes and Cryptography
, vol.35
, Issue.1
, pp. 63-79
-
-
Berger, T.P.1
Loidreau, P.2
-
3
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.A.: On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory 24, 384-386 (1978)
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, pp. 384-386
-
-
Berlekamp, E.R.1
McEliece, R.J.2
Van Tilborg, H.C.A.3
-
4
-
-
56749164782
-
Attacking and defending the McEliece cryptosystem
-
Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
-
Bernstein, D.J., Lange, T., Peters, C.: Attacking and defending the McEliece cryptosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5299
, pp. 31-46
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
5
-
-
77954408261
-
Explicit bounds for generic decoding algorithms for code-based cryptography
-
Bernstein, D.J., Lange, T., Peters, C., van Tilborg, H.C.A.: Explicit bounds for generic decoding algorithms for code-based cryptography. In: Pre-Proceedings of WCC 2009, pp. 168-180 (2009)
-
(2009)
Pre-Proceedings of WCC 2009
, pp. 168-180
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
Van Tilborg, H.C.A.4
-
6
-
-
0031675932
-
A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
-
Canteaut, A., Chabaud, F.: A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511. IEEE Transactions on Information Theory 44(1), 367-378 (1998)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.1
, pp. 367-378
-
-
Canteaut, A.1
Chabaud, F.2
-
7
-
-
72449174805
-
Security bounds for the design of code-based cryptosystems
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Finiasz, M., Sendrier, N.: Security bounds for the design of code-based cryptosystems. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 88-105. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 88-105
-
-
Finiasz, M.1
Sendrier, N.2
-
8
-
-
77954408630
-
Quantum computing
-
Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Springer, Berlin
-
Hallgren, S., Vollmer, U.: Quantum computing. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 15-34. Springer, Berlin (2009)
-
(2009)
Post-Quantum Cryptography
, pp. 15-34
-
-
Hallgren, S.1
Vollmer, U.2
-
9
-
-
0346871653
-
McEliece public key cryptosystems using algebraic-geometric codes
-
Janwa, H., Moreno, O.: McEliece public key cryptosystems using algebraic-geometric codes. Designs, Codes and Cryptography 8(3), 293-307 (1996)
-
(1996)
Designs, Codes and Cryptography
, vol.8
, Issue.3
, pp. 293-307
-
-
Janwa, H.1
Moreno, O.2
-
10
-
-
85034651324
-
An observation on the security of McEliece's public-key cryptosystem
-
Günther, C.G. (ed.) EUROCRYPT 1988. Springer, Heidelberg
-
Lee, P.J., Brickell, E.F.: An observation on the security of McEliece's public-key cryptosystem. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 275-280. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.330
, pp. 275-280
-
-
Lee, P.J.1
Brickell, E.F.2
-
11
-
-
0024078914
-
A probabilistic algorithm for computing minimum weights of large error-correcting codes
-
Leon, J.S.: A probabilistic algorithm for computing minimum weights of large error-correcting codes. IEEE Transactions on Information Theory 34(5), 1354-1359 (1988)
-
(1988)
IEEE Transactions on Information Theory
, vol.34
, Issue.5
, pp. 1354-1359
-
-
Leon, J.S.1
-
12
-
-
0003777826
-
A public-key cryptosystem based on algebraic coding theory
-
McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Jet Propulsion Laboratory DSN Progress Report 42-44 (1978), http://ipnpr.jpl.nasa.gov/progress-report2/42-44/44N.PDF
-
(1978)
Jet Propulsion Laboratory DSN Progress Report 42-44
-
-
McEliece, R.J.1
-
13
-
-
70549109066
-
Compact McEliece keys from Goppa codes
-
Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. Springer, Heidelberg
-
Misoczki, R., Barreto, P.S.L.M.: Compact McEliece keys from Goppa codes. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 376-392. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5867
, pp. 376-392
-
-
Misoczki, R.1
Barreto, P.S.L.M.2
-
14
-
-
77954400700
-
Code-based cryptography
-
Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Springer, Berlin
-
Overbeck, R., Sendrier, N.: Code-based cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 95-145. Springer, Berlin (2009)
-
(2009)
Post-Quantum Cryptography
, pp. 95-145
-
-
Overbeck, R.1
Sendrier, N.2
-
15
-
-
33746812562
-
The use of information sets in decoding cyclic codes
-
Prange, E.: The use of information sets in decoding cyclic codes. IRE Transactions on Information Theory 8(5), 5-9 (1962)
-
(1962)
IRE Transactions on Information Theory
, vol.8
, Issue.5
, pp. 5-9
-
-
Prange, E.1
-
16
-
-
84964937021
-
A method for finding codewords of small weight
-
Wolfmann, J., Cohen, G. (eds.) Coding Theory 1988. Springer, Heidelberg
-
Stern, J.: A method for finding codewords of small weight. In:Wolfmann, J., Cohen, G. (eds.) Coding Theory 1988. LNCS, vol. 388, pp. 106-113. Springer, Heidelberg (1989)
-
(1989)
LNCS
, vol.388
, pp. 106-113
-
-
Stern, J.1
|