-
2
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.A.: On the inherent intractability of certain coding problems. IEEE Trans. Information Theory 24(3), 384-386 (1978)
-
(1978)
IEEE Trans. Information Theory
, vol.24
, Issue.3
, pp. 384-386
-
-
Berlekamp, E.R.1
McEliece, R.J.2
Van Tilborg, H.C.A.3
-
3
-
-
56749100757
-
-
Technical report, University of Illinois at Chicago
-
Bernstein, D.J.: List decoding for binary codes. Technical report, University of Illinois at Chicago (2008), http://cr.yp.to/codes/goppalist- 20081107.pdf
-
(2008)
List Decoding for Binary Codes
-
-
Bernstein, D.J.1
-
5
-
-
56749164782
-
Attacking and Defending theMcEliece Cryptosystem
-
Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
-
Bernstein, D.J., Lange, T., Peters, C.: Attacking and Defending theMcEliece Cryptosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008), http://eprint.iacr.org/2008/ 318
-
(2008)
LNCS
, vol.5299
, pp. 31-46
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
6
-
-
84872730929
-
Efficient Root Finding of Polynomials over Fields of Characteristic 2
-
WEWoRC 2009. Springer, Heidelberg, to appear
-
Biswas, B., Herbert, V.: Efficient Root Finding of Polynomials over Fields of Characteristic 2. In: WEWoRC 2009. LNCS. Springer, Heidelberg (2009) (to appear)
-
(2009)
LNCS
-
-
Biswas, B.1
Herbert, V.2
-
8
-
-
35248899532
-
Template Attacks
-
Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg
-
Chari, S., Rao, J.R., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13-28. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2523
, pp. 13-28
-
-
Chari, S.1
Rao, J.R.2
Rohatgi, P.3
-
9
-
-
5244282087
-
Cyclic decoding procedure for the bose-chaudhuri-hocquenghem codes
-
Chien, R.T.: Cyclic decoding procedure for the bose-chaudhuri-hocquenghem codes. IEEE Trans. Information Theory IT-10(10), 357-363 (1964)
-
(1964)
IEEE Trans. Information Theory
, vol.10 IT-10
, pp. 357-363
-
-
Chien, R.T.1
-
12
-
-
56749092208
-
Comparison of Innovative Signature Algorithms for WSNs
-
ACM, New York
-
Driessen, B., Poschmann, A., Paar, C.: Comparison of Innovative Signature Algorithms for WSNs. In: Proceedings of ACM WiSec 2008. ACM, New York (2008)
-
(2008)
Proceedings of ACM WiSec 2008
-
-
Driessen, B.1
Poschmann, A.2
Paar, C.3
-
13
-
-
67650318950
-
-
Technical report, D.SPA.28 Rev. 1.1, July
-
ECRYPT. Yearly report on algorithms and keysizes (2007-2008). Technical report, D.SPA.28 Rev. 1.1 (July 2008), http://www.ecrypt.eu.org/documents/D.SPA. 10-1.1.pdf
-
(2008)
Yearly Report on Algorithms and Keysizes (2007-2008)
-
-
-
14
-
-
70350591229
-
MicroEliece: McEliece for Embedded Devices
-
Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
-
Eisenbarth, T., Gneysu, T., Heyse, S., Paar, C.: MicroEliece: McEliece for Embedded Devices. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 49-64. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5747
, pp. 49-64
-
-
Eisenbarth, T.1
Gneysu, T.2
Heyse, S.3
Paar, C.4
-
15
-
-
84947905764
-
An Efficient Pseudo-Random Generator Provably As Secure As Syndrome Decoding
-
Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
-
Fischer, J.-B., Stern, J.: An Efficient Pseudo-Random Generator Provably As Secure As Syndrome Decoding. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 245-255. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 245-255
-
-
Fischer, J.-B.1
Stern, J.2
-
16
-
-
77954416429
-
-
and Entropy, s, http://entropy.stop1984.com
-
Freenet and Entropy. Open-source p2p network applications (2009), s http://freenetproject.org, http://entropy.stop1984.com
-
(2009)
Open-source P2p Network Applications
-
-
-
17
-
-
35048818581
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
-
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and rsa on 8-bit cpus. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119-132. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
18
-
-
0010651267
-
A new method of solving numerical equations of all orders, by continuous approximation
-
Horner, W.G.: A new method of solving numerical equations of all orders, by continuous approximation. Philosophical Transactions of the Royal Society of London, 308-335 (1819)
-
(1819)
Philosophical Transactions of the Royal Society of London
, pp. 308-335
-
-
Horner, W.G.1
-
19
-
-
0029755739
-
Note on decoding binary goppa codes
-
Huber, K.: Note on decoding binary goppa codes. Electronics Letters 32, 102-103 (1996)
-
(1996)
Electronics Letters
, vol.32
, pp. 102-103
-
-
Huber, K.1
-
20
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
-
Kocher, P.C.: Timing Attacks On Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
21
-
-
84890863577
-
-
Springer, Heidelberg
-
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smartcards. Springer, Heidelberg (2007)
-
(2007)
Power Analysis Attacks: Revealing the Secrets of Smartcards
-
-
Mangard, S.1
Oswald, E.2
Popp, T.3
-
22
-
-
0002448405
-
A public-key cryptosystem based on algebraic coding theory
-
McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Deep Space Network Progress Report 44, 114-116 (1978)
-
(1978)
Deep Space Network Progress Report
, vol.44
, pp. 114-116
-
-
McEliece, R.J.1
-
23
-
-
84944878354
-
-
CRC Press, New York
-
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, New York (1996)
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
26
-
-
38149011465
-
A Software Implementation of the McEliece Public-Key Cryptosystem
-
Springer, Heidelberg
-
Preneel, B., Bosselaers, A., Govaerts, R., Vandewalle, J.: A Software Implementation of the McEliece Public-Key Cryptosystem. In: Proceedings of the 13th Symposium on Information Theory in the Benelux, Werkgemeenschap voor Informatie en Communicatietheorie, pp. 119-126. Springer, Heidelberg (1992)
-
(1992)
Proceedings of the 13th Symposium on Information Theory in the Benelux, Werkgemeenschap Voor Informatie en Communicatietheorie
, pp. 119-126
-
-
Preneel, B.1
Bosselaers, A.2
Govaerts, R.3
Vandewalle, J.4
-
28
-
-
84455184676
-
Efficient generation of binary words of given weight
-
Boyd, C. (ed.) Cryptography and Coding 1995. Springer, Heidelberg
-
Sendrier, N.: Efficient generation of binary words of given weight. In: Boyd, C. (ed.) Cryptography and Coding 1995. LNCS, vol. 1025, pp. 184-187. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.1025
, pp. 184-187
-
-
Sendrier, N.1
-
30
-
-
56749169082
-
Side Channels in the McEliece PKC
-
Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
-
Strenzke, F., Tews, E., Molter, H., Overbeck, R., Shoufan, A.: Side Channels in the McEliece PKC. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 216-229. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5299
, pp. 216-229
-
-
Strenzke, F.1
Tews, E.2
Molter, H.3
Overbeck, R.4
Shoufan, A.5
-
31
-
-
0016434152
-
A Method for Solving Key Equation for Decoding Goppa Codes
-
Sugiyama, Y., Kasahara, M., Hirasawa, S., Namekawa, T.: A Method for Solving Key Equation for Decoding Goppa Codes. IEEE Transactions on Information and Control 27, 87-99 (1975)
-
(1975)
IEEE Transactions on Information and Control
, vol.27
, pp. 87-99
-
-
Sugiyama, Y.1
Kasahara, M.2
Hirasawa, S.3
Namekawa, T.4
-
32
-
-
0016927995
-
An erasures-and-errors decoding algorithm for goppa codes
-
corresp.
-
Sugiyama, Y., Kasahara, M., Hirasawa, S., Namekawa, T.: An erasures-and-errors decoding algorithm for goppa codes (corresp.). IEEE Transactions on Information Theory 22, 238-241 (1976)
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, pp. 238-241
-
-
Sugiyama, Y.1
Kasahara, M.2
Hirasawa, S.3
Namekawa, T.4
|