-
3
-
-
52149114896
-
A new analysis of the McEliece cryptosystem based on QC-LDPC codes
-
Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. Springer, Heidelberg
-
Baldi, M., Bodrato, M., Chiaraluce, G.F.: A new analysis of the McEliece cryptosystem based on QC-LDPC codes. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 246-262. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5229
, pp. 246-262
-
-
Baldi, M.1
Bodrato, M.2
Chiaraluce, G.F.3
-
4
-
-
51649105649
-
Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC codes
-
Baldi, M., Chiaraluce, G.F.: Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC codes. In: IEEE International Symposium on Information Theory, Nice, France, March 2007, pp. 2591-2595 (2007)
-
(2007)
IEEE International Symposium on Information Theory, Nice, France, March 2007
, pp. 2591-2595
-
-
Baldi, M.1
Chiaraluce, G.F.2
-
5
-
-
70350633827
-
Reducing key length of the McEliece cryptosystem
-
Preneel, B. (ed.) AFRICACRYPT 2009. Springer, Heidelberg
-
Berger, T.P., Cayrel, P.L., Gaborit, P., Otmani, A.: Reducing key length of the McEliece cryptosystem. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 77-97. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5580
, pp. 77-97
-
-
Berger, T.P.1
Cayrel, P.L.2
Gaborit, P.3
Otmani, A.4
-
6
-
-
14844342361
-
How to mask the structure of codes for a cryptographic use
-
Berger, T.P., Loidreau, P.: How to mask the structure of codes for a cryptographic use. Designs Codes and Cryptography 35(1), 63-79 (2005)
-
(2005)
Designs Codes and Cryptography
, vol.35
, Issue.1
, pp. 63-79
-
-
Berger, T.P.1
Loidreau, P.2
-
7
-
-
35048902516
-
Designing an efficient and secure public-key cryptosystem based on reducible rank codes
-
Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. Springer, Heidelberg
-
Berger, T.P., Loidreau, P.: Designing an efficient and secure public-key cryptosystem based on reducible rank codes. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 218-229. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3348
, pp. 218-229
-
-
Berger, T.P.1
Loidreau, P.2
-
8
-
-
56749164782
-
Attacking and defending the McEliece cryptosystem
-
Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
-
Bernstein, D.J., Lange, T., Peters, C.: Attacking and defending the McEliece cryptosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5299
, pp. 31-46
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
9
-
-
77954408261
-
Explicit bounds for generic decoding algorithms for code-based cryptography
-
Bernstein, D.J., Lange, T., Peters, C., van Tilborg, H.: Explicit bounds for generic decoding algorithms for code-based cryptography. In: Pre-proceedings of WCC 2009, pp. 168-180 (2009)
-
(2009)
Pre-proceedings of WCC 2009
, pp. 168-180
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
Van Tilborg, H.4
-
10
-
-
56749156338
-
McEliece cryptosystem implementation: Theory and practice
-
Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
-
Biswas, B., Sendrier, N.: McEliece cryptosystem implementation: Theory and practice. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 47-62. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5299
, pp. 47-62
-
-
Biswas, B.1
Sendrier, N.2
-
12
-
-
0003908675
-
Ideals, Varieties, and algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra
-
Springer, New York
-
Cox, D.A., Little, J.B., O'Shea, D.: Ideals, Varieties, and algorithms: an Introduction to Computational Algebraic Geometry and Commutative Algebra. Undergraduate Texts in Mathematics. Springer, New York (2001)
-
(2001)
Undergraduate Texts in Mathematics
-
-
Cox, D.A.1
Little, J.B.2
O'Shea, D.3
-
13
-
-
0033143274
-
A new efficient algorithm for computing gröbner bases (f4)
-
Faugère, J.-C.: A new efficient algorithm for computing gröbner bases (f4). Journal of Pure and Applied Algebra 139(1-3), 61-88 (1999)
-
(1999)
Journal of Pure and Applied Algebra
, vol.139
, Issue.1-3
, pp. 61-88
-
-
Faugère, J.-C.1
-
14
-
-
0036045901
-
A new efficient algorithm for computing gröbner bases without reduction to zero: F5
-
ACM press, New York
-
Faugère, J.-C.: A new efficient algorithm for computing gröbner bases without reduction to zero: F5. In: ISSAC 2002, pp. 75-83. ACM press, New York (2002)
-
(2002)
ISSAC 2002
, pp. 75-83
-
-
Faugère, J.-C.1
-
15
-
-
51849145057
-
Cryptanalysis of minrank
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Faugère, J.-C., Levy-dit Vehel, F., Perret, L.: Cryptanalysis of minrank. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 280-296. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 280-296
-
-
Faugère, J.-C.1
Levy-dit Vehel, F.2
Perret, L.3
-
16
-
-
77954649574
-
-
CoRR, abs/1001.4004
-
Faugère, J.-C., El Din, M.S., Spaenlehauer, P.-J.: Gröbner bases of bihomogeneous ideals generated by polynomials of bidegree (1,1): Algorithms and complexity. CoRR, abs/1001.4004 (2010)
-
(2010)
Gröbner Bases of Bihomogeneous Ideals Generated by Polynomials of Bidegree (1,1): Algorithms and Complexity
-
-
Faugère, J.-C.1
El Din, M.S.2
Spaenlehauer, P.-J.3
-
17
-
-
25944479355
-
Efficient computation of zerodimensional gröbner bases by change of ordering
-
Faugère, J.-C., Gianni, P.M., Lazard, D., Mora, T.: Efficient computation of zerodimensional gröbner bases by change of ordering. J. Symb. Comput. 16(4), 329-344 (1993)
-
(1993)
J. Symb. Comput.
, vol.16
, Issue.4
, pp. 329-344
-
-
Faugère, J.-C.1
Gianni, P.M.2
Lazard, D.3
Mora, T.4
-
18
-
-
77954634561
-
Cryptanalysis of the McEliece cryptosystem over hyperelliptic curves
-
Faure, C., Minder, L.: Cryptanalysis of the McEliece cryptosystem over hyperelliptic curves. In: Proceedings of the eleventh International Workshop on Algebraic and Combinatorial Coding Theory, Pamporovo, Bulgaria, June 2008, pp. 99-107 (2008)
-
(2008)
Proceedings of the Eleventh International Workshop on Algebraic and Combinatorial Coding Theory, Pamporovo, Bulgaria, June 2008
, pp. 99-107
-
-
Faure, C.1
Minder, L.2
-
19
-
-
72449174805
-
Security bounds for the design of code-based crypto systems
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Finiasz, M., Sendrier, N.: Security bounds for the design of code-based crypto systems. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 88-105. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 88-105
-
-
Finiasz, M.1
Sendrier, N.2
-
20
-
-
84935622001
-
Ideals over a non-commutative ring and their applications to cryptography
-
Davies, D.W. (ed.) EUROCRYPT 1991. Springer, Heidelberg
-
Gabidulin, E., Paramonov, A.V., Tretjakov, O.V.: Ideals over a non-commutative ring and their applications to cryptography. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 482-489. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 482-489
-
-
Gabidulin, E.1
Paramonov, A.V.2
Tretjakov, O.V.3
-
21
-
-
51649128710
-
Shorter keys for code based cryptography
-
Ytrehus, Ø. (ed.) WCC 2005. Springer, Heidelberg
-
Gaborit, P.: Shorter keys for code based cryptography. In: Ytrehus, Ø. (ed.) WCC 2005. LNCS, vol. 3969, pp. 81-91. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3969
, pp. 81-91
-
-
Gaborit, P.1
-
22
-
-
0346827230
-
Severely denting the Gabidulin version of the McEliece public key cryptosystem
-
Gibson, J.K.: Severely denting the Gabidulin version of the McEliece public key cryptosystem. Design Codes and Cryptography 6(1), 37-45 (1995)
-
(1995)
Design Codes and Cryptography
, vol.6
, Issue.1
, pp. 37-45
-
-
Gibson, J.K.1
-
23
-
-
0346871653
-
McEliece public key cryptosystems using algebraic-geometric codes
-
Janwa, H., Moreno, O.: McEliece public key cryptosystems using algebraic-geometric codes. Designs Codes and Cryptography 8(3), 293-307 (1996) (Pubitemid 126708388)
-
(1996)
Designs, Codes, and Cryptography
, vol.8
, Issue.3
, pp. 293-307
-
-
Janwa, H.1
Moreno, O.2
-
26
-
-
38049165687
-
Cryptanalysis of the Sidelnikov cryptosystem
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Minder, L., Shokrollahi, A.: Cryptanalysis of the Sidelnikov cryptosystem. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 347-360. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 347-360
-
-
Minder, L.1
Shokrollahi, A.2
-
27
-
-
70549109066
-
Compact McEliece keys from Goppa codes
-
Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. Springer, Heidelberg
-
Misoczki, R., Barreto, P.S.L.M.: Compact McEliece keys from Goppa codes. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 376-392. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5867
, pp. 376-392
-
-
Misoczki, R.1
Barreto, P.S.L.M.2
-
28
-
-
24944541292
-
A public-key cryptosystem based on shift register sequences
-
Pichler, F. (ed.) EUROCRYPT 1985. Springer, Heidelberg
-
Niederreiter, H.: A public-key cryptosystem based on shift register sequences. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol. 219, pp. 35-39. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.219
, pp. 35-39
-
-
Niederreiter, H.1
-
29
-
-
72449164289
-
Cryptanalysis of McEliece cryptosystem based on quasi-cyclic ldpc codes
-
LMIB Beihang University
-
Otmani, A., Tillich, J.P., Dallot, L.: Cryptanalysis of McEliece cryptosystem based on quasi-cyclic ldpc codes. In: Proceedings of First International Conference on Symbolic Computation and Cryptography, Beijing, China, April 28-30, pp. 69-81. LMIB Beihang University (2008)
-
(2008)
Proceedings of First International Conference on Symbolic Computation and Cryptography, Beijing, China, April 28-30
, pp. 69-81
-
-
Otmani, A.1
Tillich, J.P.2
Dallot, L.3
-
30
-
-
43249125012
-
Structural attacks for public key cryptosystems based on Gabidulin codes
-
Overbeck, R.: Structural attacks for public key cryptosystems based on Gabidulin codes. J. Cryptology 21(2), 280-301 (2008)
-
(2008)
J. Cryptology
, vol.21
, Issue.2
, pp. 280-301
-
-
Overbeck, R.1
-
31
-
-
0027983324
-
A public-key cryptosytem based on Reed-Muller codes
-
Sidelnikov, V.M.: A public-key cryptosytem based on Reed-Muller codes. Discrete Mathematics and Applications 4(3), 191-207 (1994)
-
(1994)
Discrete Mathematics and Applications
, vol.4
, Issue.3
, pp. 191-207
-
-
Sidelnikov, V.M.1
-
32
-
-
84929257781
-
On the insecurity of cryptosystems based on generalized Reed-Solomon codes
-
Sidelnikov, V.M., Shestakov, S.O.: On the insecurity of cryptosystems based on generalized Reed-Solomon codes. Discrete Mathematics and Applications 1(4), 439-444 (1992)
-
(1992)
Discrete Mathematics and Applications
, vol.1
, Issue.4
, pp. 439-444
-
-
Sidelnikov, V.M.1
Shestakov, S.O.2
-
33
-
-
84964937021
-
A method for finding codewords of small weight
-
Wolfmann, J., Cohen, G. (eds.) Coding Theory 1988. Springer, Heidelberg
-
Stern, J.: A method for finding codewords of small weight. In:Wolfmann, J., Cohen, G. (eds.) Coding Theory 1988. LNCS, vol. 388, pp. 106-113. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.388
, pp. 106-113
-
-
Stern, J.1
|