메뉴 건너뛰기




Volumn 6544 LNCS, Issue , 2011, Pages 143-158

Wild McEliece

Author keywords

Goppa codes; list decoding; McEliece cryptosystem; Niederreiter cryptosystem; wild Goppa codes

Indexed keywords

GOPPA CODES; LIST DECODING; MCELIECE CRYPTOSYSTEM; NIEDERREITER CRYPTOSYSTEM; WILD GOPPA CODES;

EID: 79952615449     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19574-7_10     Document Type: Conference Paper
Times cited : (54)

References (45)
  • 2
    • 78651525433 scopus 로고    scopus 로고
    • Reducing key length of the mceliece cryptosystem
    • Citations in This Document: §6
    • Berger, T.P., Cayrel, P.-L., Gaborit, P., Otmani, A.: Reducing Key Length of the McEliece Cryptosystem. In: AFRICACRYPT 2009 [35], pp. 77-97 (2009), Citations in This Document: §6
    • (2009) AFRICACRYPT 2009 , vol.35 , pp. 77-97
    • Berger, T.P.1    Cayrel, P.-L.2    Gaborit, P.3    Otmani, A.4
  • 3
    • 85063136360 scopus 로고    scopus 로고
    • Grover vs. McEliece
    • Citations in This Document: §1
    • Bernstein, D.J.: Grover vs. McEliece. In: PQCrypto 2010 [36], pp. 73-80 (2010), http://cr.yp.to/papers.html#grovercode, Citations in This Document: §1
    • (2010) PQCrypto 2010 , vol.36 , pp. 73-80
    • Bernstein, D.J.1
  • 5
    • 70350258302 scopus 로고    scopus 로고
    • Fast multiplication and its applications
    • Citations in This Document: §5
    • Bernstein, D.J.: Fast Multiplication and Its Applications. In: Algorithmic Number Theory [10], pp. 325-384 (2008), http://cr.yp.to/papers. html#multapps, Citations in This Document: §5
    • (2008) Algorithmic Number Theory , vol.10 , pp. 325-384
    • Bernstein, D.J.1
  • 7
    • 78650316312 scopus 로고    scopus 로고
    • Attacking and defending the mceliece cryptosystem
    • Citations in This Document: §1, §6, §7
    • Bernstein, D.J., Lange, T., Peters, C.: Attacking and Defending the McEliece Cryptosystem. In: PQCrypto 2008 [9], pp. 31-46 (2008), http://eprint.iacr. org/2008/318, Citations in This Document: §1, §6, §7
    • (2008) PQCrypto 2008 , vol.9 , pp. 31-46
    • Bernstein, D.J.1    Lange, T.2    Peters, C.3
  • 11
    • 0031675932 scopus 로고    scopus 로고
    • A new algorithm for finding minimum-weight words in a linear code: application to mceliece's cryptosystem and to narrow-sense bch codes of length 511
    • PII S0018944898000182
    • Canteaut, A., Chabaud, F.: A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to McEliece's Cryptosystem and to Narrow- Sense BCH Codes of Length 511. IEEE Transactions on Information Theory 44, 367-378 (1998), http://hal.inria.fr/inria-00074006/en/,MR 98m:94043, Citations in This Document: §6 (Pubitemid 128737912)
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.1 , pp. 367-378
    • Canteaut, A.1    Chabaud, F.2
  • 13
    • 84929461941 scopus 로고    scopus 로고
    • How to achieve a mceliece-based digital signature scheme
    • MR 2003h: 94028, Citations in This Document: §6
    • Courtois, N., Finiasz, M., Sendrier, N.: How to Achieve a McEliece-Based Digital Signature Scheme. In: ASIACRYPT 2001 [8], pp. 157-174 (2001), http://hal.inria.fr/docs/00/07/25/11/PDF/RR-4118.pdf, MR 2003h:94028, Citations in This Document: §6
    • (2001) ASIACRYPT 2001 , vol.8 , pp. 157-174
    • Courtois, N.1    Finiasz, M.2    Sendrier, N.3
  • 14
    • 79952590160 scopus 로고    scopus 로고
    • Algebraic cryptanalysis of mceliece variants with compact keys
    • Citations in This Document: §6, §6
    • Faug̀ere, J.-C., Otmani, A., Perret, L., Tillich, J.-P.: Algebraic Cryptanalysis of McEliece Variants with Compact Keys. In: EUROCRYPT 2010 [18], pp. 279-298 (2010), Citations in This Document: §6, §6
    • (2010) EUROCRYPT 2010 , vol.18 , pp. 279-298
    • Faug̀ere, J.-C.1    Otmani, A.2    Perret, L.3    Tillich, J.-P.4
  • 15
    • 77954634561 scopus 로고    scopus 로고
    • Cryptanalysis of the mceliece cryptosystem over hyperelliptic codes
    • Citations in This Document: §4
    • Faure, C., Minder, L.: Cryptanalysis of the McEliece Cryptosystem over Hyperelliptic Codes. In: ACCT 2008 [1], pp. 99-107 (2008), http://www.moi.math. bas. bg/acct2008/b17.pdf , Citations in This Document: §4
    • (2008) ACCT 2008 , vol.1 , pp. 99-107
    • Faure, C.1    Minder, L.2
  • 16
    • 79952611238 scopus 로고    scopus 로고
    • Security bounds for the design of code-based cryptosystems
    • Citations in This Document: §6, §6
    • Finiasz, M., Sendrier, N.: Security Bounds for the Design of Code-Based Cryptosystems. In: ASIACRYPT 2009 [27], pp. 88-105 (2009), http://eprint. iacr.org/2009/414 , Citations in This Document: §6, §6
    • (2009) ASIACRYPT 2009 , vol.27 , pp. 88-105
    • Finiasz, M.1    Sendrier, N.2
  • 19
    • 0033183669 scopus 로고    scopus 로고
    • Improved decoding of Reed-Solomon and algebraic-geometry codes
    • DOI 10.1109/18.782097
    • Guruswami, V., Sudan, M.: Improved Decoding of Reed-Solomon and Algebraic- Geometry Codes. IEEE Transactions on Information Theory 45, 1757-1767 (1999), http://theory.lcs.mit.edu/~madhu/bib.html, ISSN 0018-9448, MR 2000j:94033, Citations in This Document: §5 (Pubitemid 32871911)
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.6 , pp. 1757-1767
    • Guruswami Venkatesan1    Sudan Madhu2
  • 22
    • 0346871653 scopus 로고    scopus 로고
    • McEliece public key cryptosystems using algebraic-geometric codes
    • Janwa, H., Moreno, O.: McEliece Public Key Cryptosystems Using Algebraic- Geometric Codes. Designs, Codes and Cryptography 3, 293-307 (1996), Citations in This Document: §1, §4 (Pubitemid 126708388)
    • (1996) Designs, Codes, and Cryptography , vol.8 , Issue.3 , pp. 293-307
    • Janwa, H.1    Moreno, O.2
  • 24
    • 79952590161 scopus 로고    scopus 로고
    • Public key cryptography: Proceedings of the 4th international workshop on practice and theory in public key cryptosystems (pkc 2001) held on cheju island, February 13-15, 2001
    • Springer, Heidelberg, See [25]
    • Kim, K. (ed.): Public Key Cryptography: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2001) Held on Cheju Island, February 13-15, 2001. LNCS, vol. 1992. Springer, Heidelberg (2001), See [25]
    • (2001) LNCS , vol.1992
    • Kim, K.1
  • 25
    • 84937393537 scopus 로고    scopus 로고
    • Semantically Secure McEliece Public-Key Cryptosystems - Conversions for McEliece PKC
    • Public Key Cryptography
    • Kobara, K., Imai, H.: Semantically Secure McEliece Public-Key Cryptosystems - Conversions for McEliece PKC. In: PKC 2001 [24], pp. 19-35 (2001), MR 2003c:94027, Citations in This Document: §5, §6, §7 (Pubitemid 33232930)
    • (2001) Lecture Notes in Computer Science , Issue.1992 , pp. 19-35
    • Kobara, K.1    Imai, H.2
  • 26
    • 0028294826 scopus 로고
    • On the equivalence of mceliece's and niederreiter's public-key cryptosystems
    • Citations in This Document: §2
    • Li, Y.X., Deng, R.H., Wang, X.M.: On the Equivalence of McEliece's and Niederreiter's Public-Key Cryptosystems. IEEE Transactions on Information Theory 40, 271-273 (1994), Citations in This Document: §2
    • (1994) IEEE Transactions on Information Theory , vol.40 , pp. 271-273
    • Li, Y.X.1    Deng, R.H.2    Wang, X.M.3
  • 27
    • 79952581319 scopus 로고    scopus 로고
    • Proceedings of advances in cryptology - ASIACRYPT 2009, 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6-10, 2009
    • Springer, Heidelberg, See [16]
    • Matsui, M. (ed.): Proceedings of Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. LNCS, vol. 5912. Springer, Heidelberg (2009), See [16]
    • (2009) LNCS , vol.5912
    • Matsui, M.1
  • 28
    • 0002448405 scopus 로고
    • A Public-key cryptosystem based on algebraic coding theory
    • Citations in This Document: §1, §2
    • McEliece, R.J.: A Public-Key Cryptosystem Based on Algebraic Coding Theory, JPL DSN Progress Report, pp. 114-116 (1978), http://ipnpr. jpl.nasa.gov/progress report2/42-44/44N.PDF, Citations in This Document: §1, §2
    • (1978) JPL DSN Progress Report , pp. 114-116
    • McEliece, R.J.1
  • 29
    • 79952594605 scopus 로고    scopus 로고
    • Ph.D. Thesis, EPFL, PhD thesis, Citations in This Document: §4
    • Minder, L.: Cryptography Based on Error-Correcting Codes, Ph.D. Thesis, EPFL, PhD thesis 3846 (2007), Citations in This Document: §4
    • (2007) Cryptography Based on Error-Correcting Codes , vol.3846
    • Minder, L.1
  • 30
    • 70549109066 scopus 로고    scopus 로고
    • Compact mceliece keys from goppa codes
    • Citations in This Document: §1, §6
    • Misoczki, R., Barreto, P.S.L.M.: Compact McEliece Keys from Goppa Codes. In: SAC 2009 [21], pp. 376-392 (2009), Citations in This Document: §1, §6
    • (2009) SAC 2009 , vol.21 , pp. 376-392
    • Misoczki, R.1    Barreto, P.S.L.M.2
  • 31
    • 0022582790 scopus 로고
    • Knapsack-Type Cryptosystems and Algebraic Coding Theory
    • Niederreiter, H.: Knapsack-Type Cryptosystems and Algebraic Coding Theory. Problems of Control and Information Theory 15, 159-166 (1986), Citations in This Document: §1, §2 (Pubitemid 16608352)
    • (1986) Problems of control and information theory , vol.15 , Issue.2 , pp. 159-166
    • Niederreiter, H.1
  • 32
    • 77954400700 scopus 로고    scopus 로고
    • Code-based cryptography
    • Citations in This Document: §1, §7
    • Overbeck, R., Sendrier, N.: Code-Based Cryptography. In: Post-Quantum Cryptography [6], pp. 95-145 (2009), Citations in This Document: §1, §7
    • (2009) Post-Quantum Cryptography , vol.6 , pp. 95-145
    • Overbeck, R.1    Sendrier, N.2
  • 33
    • 0016487667 scopus 로고
    • The algebraic decoding of goppa codes
    • Citations in This Document: §1, §5
    • Patterson, N.J.: The Algebraic Decoding of Goppa Codes. IEEE Transactions on Information Theory 21, 203-207 (1975), Citations in This Document: §1, §5
    • (1975) IEEE Transactions on Information Theory , vol.21 , pp. 203-207
    • Patterson, N.J.1
  • 34
    • 79952592088 scopus 로고    scopus 로고
    • Information-set decoding for linear codes over fq
    • Citations in This Document: §1, §4, §6, §6, §7
    • Peters, C.: Information-Set Decoding for Linear Codes over Fq. In: PQCrypto 2010 [36], pp. 81-94 (2010), http://eprint.iacr.org/2009/589, Citations in This Document: §1, §4, §6, §6, §7
    • (2010) PQCrypto 2010 , vol.36 , pp. 81-94
    • Peters, C.1
  • 35
    • 79952593762 scopus 로고    scopus 로고
    • Progress in cryptology - AFRICACRYPT 2009, second international conference on cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009
    • Springer, Heidelberg, See [2]
    • Preneel, B. (ed.): Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. LNCS, vol. 5580. Springer, Heidelberg (2009), See [2]
    • (2009) LNCS , vol.5580
    • Preneel, B.1
  • 36
    • 79952607490 scopus 로고    scopus 로고
    • Post-Quantum cryptography, third international workshop, PQCrypto, Darmstadt, Germany, May 25-28, 2010
    • Springer, Heidelberg, See [3], [34]
    • Sendrier, N. (ed.): Post-Quantum Cryptography, Third International Workshop, PQCrypto, Darmstadt, Germany, May 25-28, 2010. LNCS, vol. 6061. Springer, Heidelberg (2010), See [3], [34]
    • (2010) LNCS , vol.6061
    • Sendrier, N.1
  • 37
    • 0034226112 scopus 로고    scopus 로고
    • Finding the permutation between equivalent linear codes: The support splitting algorithm
    • MR 2001e: 94017, Citations in This Document: §6
    • Sendrier, N.: Finding the Permutation between Equivalent Linear Codes: The Support Splitting Algorithm. IEEE Transactions on Information Theory 46, 1193- 1203 (2000), http://hal.inria.fr/docs/00/07/30/37/PDF/ RR-3637.pdf , MR 2001e:94017, Citations in This Document: §6
    • (2000) IEEE Transactions on Information Theory , vol.46 , pp. 1193-1203
    • Sendrier, N.1
  • 38
    • 84929257781 scopus 로고
    • On an encoding system constructed on the basis of generalized reed-solomon codes
    • MR 94f: 94009, Citations in This Document: §1, §2
    • Sidelnikov, V.M., Shestakov, S.O.: On an Encoding System Constructed on the Basis of Generalized Reed-Solomon Codes. Discrete Mathematics and Applications 2, 439-444 (1992), MR 94f:94009, Citations in This Document: §1, §2
    • (1992) Discrete Mathematics and Applications , vol.2 , pp. 439-444
    • Sidelnikov, V.M.1    Shestakov, S.O.2
  • 39
    • 64249164652 scopus 로고    scopus 로고
    • The Sage Group, Citations in This Document: §5
    • Stein, W. (ed.): Sage Mathematics Software (Version 4.4.3). The Sage Group (2010), http://www.sagemath.org, Citations in This Document: §5
    • (2010) Sage Mathematics Software (Version 4.4.3)
    • Stein, W.1
  • 41
    • 0016996242 scopus 로고
    • Further results on goppa codes and their applications to constructing effcient binary codes
    • Citations in This Document: §1, §4, §4, §4
    • Sugiyama, Y., Kasahara, M., Hirasawa, S., Namekawa, T.: Further Results on Goppa Codes and Their Applications to Constructing Effcient Binary Codes. IEEE Transactions on Information Theory 22, 518-526 (1976), Citations in This Document: §1, §4, §4, §4
    • (1976) IEEE Transactions on Information Theory , vol.22 , pp. 518-526
    • Sugiyama, Y.1    Kasahara, M.2    Hirasawa, S.3    Namekawa, T.4
  • 44
    • 0024078955 scopus 로고
    • On the parameters of goppa codes
    • Citations in This Document: §4
    • Wirtz, M.: On the Parameters of Goppa Codes. IEEE Transactions on Information Theory 34, 1341-1343 (1988), Citations in This Document: §4
    • (1988) IEEE Transactions on Information Theory , vol.34 , pp. 1341-1343
    • Wirtz, M.1
  • 45
    • 0000966673 scopus 로고    scopus 로고
    • Proceedings of advances in cryptology - CRYPTO 2002: 22nd annual international cryptology conference, Santa Barbara, California, USA, August 2002
    • Springer, Heidelberg, ISBN 3-540-44050-X, See [42]
    • Yung, M. (ed.): Proceedings of Advances in Cryptology - CRYPTO 2002: 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 2002. LNCS, vol. 2442. Springer, Heidelberg (2002) ISBN 3-540-44050-X, See [42]
    • (2002) LNCS , vol.2442
    • Yung, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.