-
2
-
-
78651525433
-
Reducing key length of the mceliece cryptosystem
-
Citations in This Document: §6
-
Berger, T.P., Cayrel, P.-L., Gaborit, P., Otmani, A.: Reducing Key Length of the McEliece Cryptosystem. In: AFRICACRYPT 2009 [35], pp. 77-97 (2009), Citations in This Document: §6
-
(2009)
AFRICACRYPT 2009
, vol.35
, pp. 77-97
-
-
Berger, T.P.1
Cayrel, P.-L.2
Gaborit, P.3
Otmani, A.4
-
3
-
-
85063136360
-
Grover vs. McEliece
-
Citations in This Document: §1
-
Bernstein, D.J.: Grover vs. McEliece. In: PQCrypto 2010 [36], pp. 73-80 (2010), http://cr.yp.to/papers.html#grovercode, Citations in This Document: §1
-
(2010)
PQCrypto 2010
, vol.36
, pp. 73-80
-
-
Bernstein, D.J.1
-
5
-
-
70350258302
-
Fast multiplication and its applications
-
Citations in This Document: §5
-
Bernstein, D.J.: Fast Multiplication and Its Applications. In: Algorithmic Number Theory [10], pp. 325-384 (2008), http://cr.yp.to/papers. html#multapps, Citations in This Document: §5
-
(2008)
Algorithmic Number Theory
, vol.10
, pp. 325-384
-
-
Bernstein, D.J.1
-
6
-
-
70549108157
-
-
Springer, Heidelberg, ISBN 978-3-540-88701-0, See [32]
-
Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.): Post-Quantum Cryptography. Springer, Heidelberg (2009) ISBN 978-3-540-88701-0, See [32]
-
(2009)
Post-Quantum Cryptography
-
-
Bernstein, D.J.1
Buchmann, J.2
Dahmen, E.3
-
7
-
-
78650316312
-
Attacking and defending the mceliece cryptosystem
-
Citations in This Document: §1, §6, §7
-
Bernstein, D.J., Lange, T., Peters, C.: Attacking and Defending the McEliece Cryptosystem. In: PQCrypto 2008 [9], pp. 31-46 (2008), http://eprint.iacr. org/2008/318, Citations in This Document: §1, §6, §7
-
(2008)
PQCrypto 2008
, vol.9
, pp. 31-46
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
8
-
-
79952593965
-
-
Springer, Heidelberg, ISBN 3-540-42987-5, See [13]
-
Boyd, C. (ed.): Advances in Cryptology - ASIACRYPT 2001, Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security Held on the Gold Coast, December 9-13, 2001. LNCS, vol. 2248. Springer, Heidelberg (2001) ISBN 3-540-42987-5, See [13]
-
(2001)
Advances in Cryptology - ASIACRYPT 2001, Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security Held on the Gold Coast, December 9-13, 2001. LNCS
, vol.2248
-
-
Boyd, C.1
-
9
-
-
79952610624
-
-
Cincinnati, OH, USA, October 17-19, LNCS, Springer, Heidelberg (2008), See [7]
-
Buchmann, J., Ding, J. (eds.): Proceedings of Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008. LNCS, vol. 5299. Springer, Heidelberg (2008), See [7]
-
(2008)
Proceedings of Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008
, vol.5299
-
-
Buchmann, J.1
Ding, J.2
-
10
-
-
77953831475
-
-
Cambridge University Press, Cambridge, ISBN 978-0521808545, See [5]
-
Buhler, J., Stevenhagen, P. (eds.): Algorithmic Number Theory: Lattices, Number Fields, Curves and Cryptography. Cambridge University Press, Cambridge (2008) ISBN 978-0521808545, See [5]
-
(2008)
Algorithmic Number Theory: Lattices, Number Fields, Curves and Cryptography
-
-
Buhler, J.1
Stevenhagen, P.2
-
11
-
-
0031675932
-
A new algorithm for finding minimum-weight words in a linear code: application to mceliece's cryptosystem and to narrow-sense bch codes of length 511
-
PII S0018944898000182
-
Canteaut, A., Chabaud, F.: A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to McEliece's Cryptosystem and to Narrow- Sense BCH Codes of Length 511. IEEE Transactions on Information Theory 44, 367-378 (1998), http://hal.inria.fr/inria-00074006/en/,MR 98m:94043, Citations in This Document: §6 (Pubitemid 128737912)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.1
, pp. 367-378
-
-
Canteaut, A.1
Chabaud, F.2
-
12
-
-
79952600119
-
-
Springer, Heidelberg, See [40]
-
Cohen, G.D., Wolfmann, J. (eds.): Coding Theory and Applications. LNCS, vol. 388. Springer, Heidelberg (1989), See [40]
-
(1989)
Coding Theory and Applications. LNCS
, vol.388
-
-
Cohen, G.D.1
Wolfmann, J.2
-
13
-
-
84929461941
-
How to achieve a mceliece-based digital signature scheme
-
MR 2003h: 94028, Citations in This Document: §6
-
Courtois, N., Finiasz, M., Sendrier, N.: How to Achieve a McEliece-Based Digital Signature Scheme. In: ASIACRYPT 2001 [8], pp. 157-174 (2001), http://hal.inria.fr/docs/00/07/25/11/PDF/RR-4118.pdf, MR 2003h:94028, Citations in This Document: §6
-
(2001)
ASIACRYPT 2001
, vol.8
, pp. 157-174
-
-
Courtois, N.1
Finiasz, M.2
Sendrier, N.3
-
14
-
-
79952590160
-
Algebraic cryptanalysis of mceliece variants with compact keys
-
Citations in This Document: §6, §6
-
Faug̀ere, J.-C., Otmani, A., Perret, L., Tillich, J.-P.: Algebraic Cryptanalysis of McEliece Variants with Compact Keys. In: EUROCRYPT 2010 [18], pp. 279-298 (2010), Citations in This Document: §6, §6
-
(2010)
EUROCRYPT 2010
, vol.18
, pp. 279-298
-
-
Faug̀ere, J.-C.1
Otmani, A.2
Perret, L.3
Tillich, J.-P.4
-
15
-
-
77954634561
-
Cryptanalysis of the mceliece cryptosystem over hyperelliptic codes
-
Citations in This Document: §4
-
Faure, C., Minder, L.: Cryptanalysis of the McEliece Cryptosystem over Hyperelliptic Codes. In: ACCT 2008 [1], pp. 99-107 (2008), http://www.moi.math. bas. bg/acct2008/b17.pdf , Citations in This Document: §4
-
(2008)
ACCT 2008
, vol.1
, pp. 99-107
-
-
Faure, C.1
Minder, L.2
-
16
-
-
79952611238
-
Security bounds for the design of code-based cryptosystems
-
Citations in This Document: §6, §6
-
Finiasz, M., Sendrier, N.: Security Bounds for the Design of Code-Based Cryptosystems. In: ASIACRYPT 2009 [27], pp. 88-105 (2009), http://eprint. iacr.org/2009/414 , Citations in This Document: §6, §6
-
(2009)
ASIACRYPT 2009
, vol.27
, pp. 88-105
-
-
Finiasz, M.1
Sendrier, N.2
-
18
-
-
79952608305
-
-
French Riviera, May 30-June 3, LNCS, Springer, Heidelberg (2010), See [14]
-
Gilbert, H. (ed.): Proceedings of Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30-June 3, 2010. LNCS, vol. 6110. Springer, Heidelberg (2010), See [14]
-
(2010)
Proceedings of Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques
, vol.6110
-
-
Gilbert, H.1
-
19
-
-
0033183669
-
Improved decoding of Reed-Solomon and algebraic-geometry codes
-
DOI 10.1109/18.782097
-
Guruswami, V., Sudan, M.: Improved Decoding of Reed-Solomon and Algebraic- Geometry Codes. IEEE Transactions on Information Theory 45, 1757-1767 (1999), http://theory.lcs.mit.edu/~madhu/bib.html, ISSN 0018-9448, MR 2000j:94033, Citations in This Document: §5 (Pubitemid 32871911)
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.6
, pp. 1757-1767
-
-
Guruswami Venkatesan1
Sudan Madhu2
-
20
-
-
79952590774
-
-
American Mathematical Society, Providence, See [23]
-
Isaacs, I.M., Lichtman, A.I., Passman, D.S., Sehgal, S.K., Sloane, N.J.A., Zassenhaus, H.J. (eds.): Representation Theory, Group Rings, and Coding Theory: Papers in Honor of S. D. Berman. Contemporary Mathematics, vol. 93. American Mathematical Society, Providence (1989), See [23]
-
(1989)
Representation Theory, Group Rings, and Coding Theory: Papers in Honor of S. D. Berman. Contemporary Mathematics
, vol.93
-
-
Isaacs, I.M.1
Lichtman, A.I.2
Passman, D.S.3
Sehgal, S.K.4
Sloane, N.J.A.5
Zassenhaus, H.J.6
-
21
-
-
79952579071
-
-
Calgary, Alberta, Canada, August 13-14, LNCS, Springer, Heidelberg 2009), See [30]
-
Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.): Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009. LNCS, vol. 5867. Springer, Heidelberg (2009), See [30]
-
(2009)
Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009
, vol.5867
-
-
Jacobson Jr., M.J.1
Rijmen, V.2
Safavi-Naini, R.3
-
22
-
-
0346871653
-
McEliece public key cryptosystems using algebraic-geometric codes
-
Janwa, H., Moreno, O.: McEliece Public Key Cryptosystems Using Algebraic- Geometric Codes. Designs, Codes and Cryptography 3, 293-307 (1996), Citations in This Document: §1, §4 (Pubitemid 126708388)
-
(1996)
Designs, Codes, and Cryptography
, vol.8
, Issue.3
, pp. 293-307
-
-
Janwa, H.1
Moreno, O.2
-
23
-
-
79952592752
-
A remark on algebraic geometric codes
-
Citations in This Document: §4
-
Katsman, G.L., Tsfasman, M.A.: A Remark on Algebraic Geometric Codes. In: Representation Theory, Group Rings, and Coding Theory [20], pp. 197-199, Citations in This Document: §4
-
Representation Theory, Group Rings, and Coding Theory
, vol.20
, pp. 197-199
-
-
Katsman, G.L.1
Tsfasman, M.A.2
-
24
-
-
79952590161
-
Public key cryptography: Proceedings of the 4th international workshop on practice and theory in public key cryptosystems (pkc 2001) held on cheju island, February 13-15, 2001
-
Springer, Heidelberg, See [25]
-
Kim, K. (ed.): Public Key Cryptography: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2001) Held on Cheju Island, February 13-15, 2001. LNCS, vol. 1992. Springer, Heidelberg (2001), See [25]
-
(2001)
LNCS
, vol.1992
-
-
Kim, K.1
-
25
-
-
84937393537
-
Semantically Secure McEliece Public-Key Cryptosystems - Conversions for McEliece PKC
-
Public Key Cryptography
-
Kobara, K., Imai, H.: Semantically Secure McEliece Public-Key Cryptosystems - Conversions for McEliece PKC. In: PKC 2001 [24], pp. 19-35 (2001), MR 2003c:94027, Citations in This Document: §5, §6, §7 (Pubitemid 33232930)
-
(2001)
Lecture Notes in Computer Science
, Issue.1992
, pp. 19-35
-
-
Kobara, K.1
Imai, H.2
-
26
-
-
0028294826
-
On the equivalence of mceliece's and niederreiter's public-key cryptosystems
-
Citations in This Document: §2
-
Li, Y.X., Deng, R.H., Wang, X.M.: On the Equivalence of McEliece's and Niederreiter's Public-Key Cryptosystems. IEEE Transactions on Information Theory 40, 271-273 (1994), Citations in This Document: §2
-
(1994)
IEEE Transactions on Information Theory
, vol.40
, pp. 271-273
-
-
Li, Y.X.1
Deng, R.H.2
Wang, X.M.3
-
27
-
-
79952581319
-
Proceedings of advances in cryptology - ASIACRYPT 2009, 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6-10, 2009
-
Springer, Heidelberg, See [16]
-
Matsui, M. (ed.): Proceedings of Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. LNCS, vol. 5912. Springer, Heidelberg (2009), See [16]
-
(2009)
LNCS
, vol.5912
-
-
Matsui, M.1
-
28
-
-
0002448405
-
A Public-key cryptosystem based on algebraic coding theory
-
Citations in This Document: §1, §2
-
McEliece, R.J.: A Public-Key Cryptosystem Based on Algebraic Coding Theory, JPL DSN Progress Report, pp. 114-116 (1978), http://ipnpr. jpl.nasa.gov/progress report2/42-44/44N.PDF, Citations in This Document: §1, §2
-
(1978)
JPL DSN Progress Report
, pp. 114-116
-
-
McEliece, R.J.1
-
29
-
-
79952594605
-
-
Ph.D. Thesis, EPFL, PhD thesis, Citations in This Document: §4
-
Minder, L.: Cryptography Based on Error-Correcting Codes, Ph.D. Thesis, EPFL, PhD thesis 3846 (2007), Citations in This Document: §4
-
(2007)
Cryptography Based on Error-Correcting Codes
, vol.3846
-
-
Minder, L.1
-
30
-
-
70549109066
-
Compact mceliece keys from goppa codes
-
Citations in This Document: §1, §6
-
Misoczki, R., Barreto, P.S.L.M.: Compact McEliece Keys from Goppa Codes. In: SAC 2009 [21], pp. 376-392 (2009), Citations in This Document: §1, §6
-
(2009)
SAC 2009
, vol.21
, pp. 376-392
-
-
Misoczki, R.1
Barreto, P.S.L.M.2
-
31
-
-
0022582790
-
Knapsack-Type Cryptosystems and Algebraic Coding Theory
-
Niederreiter, H.: Knapsack-Type Cryptosystems and Algebraic Coding Theory. Problems of Control and Information Theory 15, 159-166 (1986), Citations in This Document: §1, §2 (Pubitemid 16608352)
-
(1986)
Problems of control and information theory
, vol.15
, Issue.2
, pp. 159-166
-
-
Niederreiter, H.1
-
32
-
-
77954400700
-
Code-based cryptography
-
Citations in This Document: §1, §7
-
Overbeck, R., Sendrier, N.: Code-Based Cryptography. In: Post-Quantum Cryptography [6], pp. 95-145 (2009), Citations in This Document: §1, §7
-
(2009)
Post-Quantum Cryptography
, vol.6
, pp. 95-145
-
-
Overbeck, R.1
Sendrier, N.2
-
33
-
-
0016487667
-
The algebraic decoding of goppa codes
-
Citations in This Document: §1, §5
-
Patterson, N.J.: The Algebraic Decoding of Goppa Codes. IEEE Transactions on Information Theory 21, 203-207 (1975), Citations in This Document: §1, §5
-
(1975)
IEEE Transactions on Information Theory
, vol.21
, pp. 203-207
-
-
Patterson, N.J.1
-
34
-
-
79952592088
-
Information-set decoding for linear codes over fq
-
Citations in This Document: §1, §4, §6, §6, §7
-
Peters, C.: Information-Set Decoding for Linear Codes over Fq. In: PQCrypto 2010 [36], pp. 81-94 (2010), http://eprint.iacr.org/2009/589, Citations in This Document: §1, §4, §6, §6, §7
-
(2010)
PQCrypto 2010
, vol.36
, pp. 81-94
-
-
Peters, C.1
-
35
-
-
79952593762
-
Progress in cryptology - AFRICACRYPT 2009, second international conference on cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009
-
Springer, Heidelberg, See [2]
-
Preneel, B. (ed.): Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. LNCS, vol. 5580. Springer, Heidelberg (2009), See [2]
-
(2009)
LNCS
, vol.5580
-
-
Preneel, B.1
-
36
-
-
79952607490
-
Post-Quantum cryptography, third international workshop, PQCrypto, Darmstadt, Germany, May 25-28, 2010
-
Springer, Heidelberg, See [3], [34]
-
Sendrier, N. (ed.): Post-Quantum Cryptography, Third International Workshop, PQCrypto, Darmstadt, Germany, May 25-28, 2010. LNCS, vol. 6061. Springer, Heidelberg (2010), See [3], [34]
-
(2010)
LNCS
, vol.6061
-
-
Sendrier, N.1
-
37
-
-
0034226112
-
Finding the permutation between equivalent linear codes: The support splitting algorithm
-
MR 2001e: 94017, Citations in This Document: §6
-
Sendrier, N.: Finding the Permutation between Equivalent Linear Codes: The Support Splitting Algorithm. IEEE Transactions on Information Theory 46, 1193- 1203 (2000), http://hal.inria.fr/docs/00/07/30/37/PDF/ RR-3637.pdf , MR 2001e:94017, Citations in This Document: §6
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, pp. 1193-1203
-
-
Sendrier, N.1
-
38
-
-
84929257781
-
On an encoding system constructed on the basis of generalized reed-solomon codes
-
MR 94f: 94009, Citations in This Document: §1, §2
-
Sidelnikov, V.M., Shestakov, S.O.: On an Encoding System Constructed on the Basis of Generalized Reed-Solomon Codes. Discrete Mathematics and Applications 2, 439-444 (1992), MR 94f:94009, Citations in This Document: §1, §2
-
(1992)
Discrete Mathematics and Applications
, vol.2
, pp. 439-444
-
-
Sidelnikov, V.M.1
Shestakov, S.O.2
-
39
-
-
64249164652
-
-
The Sage Group, Citations in This Document: §5
-
Stein, W. (ed.): Sage Mathematics Software (Version 4.4.3). The Sage Group (2010), http://www.sagemath.org, Citations in This Document: §5
-
(2010)
Sage Mathematics Software (Version 4.4.3)
-
-
Stein, W.1
-
41
-
-
0016996242
-
Further results on goppa codes and their applications to constructing effcient binary codes
-
Citations in This Document: §1, §4, §4, §4
-
Sugiyama, Y., Kasahara, M., Hirasawa, S., Namekawa, T.: Further Results on Goppa Codes and Their Applications to Constructing Effcient Binary Codes. IEEE Transactions on Information Theory 22, 518-526 (1976), Citations in This Document: §1, §4, §4, §4
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, pp. 518-526
-
-
Sugiyama, Y.1
Kasahara, M.2
Hirasawa, S.3
Namekawa, T.4
-
44
-
-
0024078955
-
On the parameters of goppa codes
-
Citations in This Document: §4
-
Wirtz, M.: On the Parameters of Goppa Codes. IEEE Transactions on Information Theory 34, 1341-1343 (1988), Citations in This Document: §4
-
(1988)
IEEE Transactions on Information Theory
, vol.34
, pp. 1341-1343
-
-
Wirtz, M.1
-
45
-
-
0000966673
-
Proceedings of advances in cryptology - CRYPTO 2002: 22nd annual international cryptology conference, Santa Barbara, California, USA, August 2002
-
Springer, Heidelberg, ISBN 3-540-44050-X, See [42]
-
Yung, M. (ed.): Proceedings of Advances in Cryptology - CRYPTO 2002: 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 2002. LNCS, vol. 2442. Springer, Heidelberg (2002) ISBN 3-540-44050-X, See [42]
-
(2002)
LNCS
, vol.2442
-
-
Yung, M.1
|