메뉴 건너뛰기




Volumn 4, Issue 8, 2011, Pages 937-946

Security of the GPT cryptosystem and its applications to cryptography

Author keywords

Code based cryptography; Gabidulin code; Public key cryptosystem; Rank distance codes

Indexed keywords

CODE-BASED CRYPTOGRAPHY; CRYPTOGRAPHIC APPLICATIONS; ERROR CORRECTING CODE; EXTENSION FIELD; GABIDULIN CODE; GPT CRYPTOSYSTEM; MATRIX; PUBLIC KEY CRYPTOSYSTEMS; PUBLIC KEYS; RANK DISTANCE CODES;

EID: 79960387857     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.228     Document Type: Article
Times cited : (27)

References (21)
  • 1
    • 0003777826 scopus 로고
    • A public key cryptosystem based on algebraic coding theory
    • 42-44, Pasadena, CA
    • McEliece RJ. A public key cryptosystem based on algebraic coding theory. In JPL DSN Progress Report 42-44, Pasadena, CA, 1978; 114-116.
    • (1978) JPL DSN Progress Report , pp. 114-116
    • McEliece, R.J.1
  • 3
    • 84935622001 scopus 로고
    • Ideals over a non-commutative ring and their application in cryptology
    • Davies DW (ed.). Lecture Notes in Computer Science, No. 547. Springer-Verlag: Berlin and Heidelberg
    • Gabidulin EM, Paramonov AV, Tretjakov OV. Ideals over a non-commutative ring and their application in cryptology. In Advances in Cryptology-EUROCRYPT'91, Davies DW (ed.). Lecture Notes in Computer Science, No. 547. Springer-Verlag: Berlin and Heidelberg, 1991; 482-489.
    • (1991) Advances in Cryptology-EUROCRYPT'91 , pp. 482-489
    • Gabidulin, E.M.1    Paramonov, A.V.2    Tretjakov, O.V.3
  • 4
    • 34547326126 scopus 로고
    • Public-key cryptosystems based on linear codes over large alphabets: efficiency and weakness. In, Farrell PG (ed.). Formara Limited: Essex
    • Gabidulin EM. Public-key cryptosystems based on linear codes over large alphabets: efficiency and weakness. In Codes and Ciphers, Farrell PG (ed.). Formara Limited: Essex, 1995; 17-32.
    • (1995) Codes and Ciphers , pp. 17-32
    • Gabidulin, E.M.1
  • 5
    • 0346827230 scopus 로고
    • Severely denting the Gabidulin version of the McEliece public key cryptosystem
    • Gibson JK. Severely denting the Gabidulin version of the McEliece public key cryptosystem. Designs, Codes and Cryptography 1995; 6(1): 37-45.
    • (1995) Designs, Codes and Cryptography , vol.6 , Issue.1 , pp. 37-45
    • Gibson, J.K.1
  • 6
    • 84947917832 scopus 로고
    • The security of the Gabidulin public-key cryptosystem
    • LNCS. Springer-Verlag: Berlin, Heidelberg 1996;
    • Gibson JK. The security of the Gabidulin public-key cryptosystem. In Advances in Cryptology-EUROCRYPT'96, Maurer UM (ed). LNCS 1070. Springer-Verlag: Berlin, Heidelberg 1996; 212-223.
    • (1070) Advances in Cryptology-EUROCRYPT'96, Maurer UM (ed) , pp. 212-223
    • Gibson, J.K.1
  • 10
    • 79960393434 scopus 로고    scopus 로고
    • High-weight errors in public-key cryptosystems based on reducible rank codes. In Proceedings of ISCTA
    • Kshevetskiy AS, Gabidulin EM. High-weight errors in public-key cryptosystems based on reducible rank codes. In Proceedings of ISCTA, 2005.
    • (2005)
    • Kshevetskiy, A.S.1    Gabidulin, E.M.2
  • 11
    • 43949117635 scopus 로고    scopus 로고
    • A new brute-force attack for GPT and variants. In Proceedings of Mycrypt'2005, of LNCS. Springer-Verlag
    • Overbeck R. A new brute-force attack for GPT and variants. In Proceedings of Mycrypt'2005, Vol. 3517 of LNCS. Springer-Verlag, 2005; 5-63.
    • (2005) , vol.3517 , pp. 5-63
    • Overbeck, R.1
  • 12
    • 43249125012 scopus 로고    scopus 로고
    • Brute-force attacks public key cryptosystem based on Gabidulin codes
    • Overbeck R. Brute-force attacks public key cryptosystem based on Gabidulin codes. Journal of Cryptology 2008; 21(2): 280-301.
    • (2008) Journal of Cryptology , vol.21 , Issue.2 , pp. 280-301
    • Overbeck, R.1
  • 13
    • 48049107481 scopus 로고    scopus 로고
    • Security of GPT-like cryptosystems based on linear rank codes. Signal Design and Its Applications in Communications, IWSDA 2007. On page(s)
    • Kshevetskiy AS. Security of GPT-like cryptosystems based on linear rank codes. Signal Design and Its Applications in Communications, 2007. IWSDA 2007. On page(s): 143-147.
    • (2007) , pp. 143-147
    • Kshevetskiy, A.S.1
  • 14
    • 43949122880 scopus 로고    scopus 로고
    • Attacks and counter-attacks on the GPT public key cryptosystem
    • DOI 10.1007/s10623-007-9160-8
    • Gabidulin EM. Attacks and counter-attacks on the GPT public key cryptosystem. Designs, Codes and Cryptography 2008; 48(2): 171-177. DOI 10.1007/s10623-007-9160-8.
    • (2008) Designs, Codes and Cryptography , vol.48 , Issue.2 , pp. 171-177
    • Gabidulin, E.M.1
  • 17
    • 85013087026 scopus 로고
    • A fast matrix decoding algorithm for rank-error-correcting codes
    • Cohen G, Litsyn S, Lobstein A, Zemor G (eds). Lecture Notes in Computer Science No. 573, Springer-Verlag: Berlin
    • Gabidulin EM. A fast matrix decoding algorithm for rank-error-correcting codes. In Algebraic Coding, Cohen G, Litsyn S, Lobstein A, Zemor G (eds). Lecture Notes in Computer Science No. 573, Springer-Verlag: Berlin, 1992; 126-132.
    • (1992) Algebraic Coding , pp. 126-132
    • Gabidulin, E.M.1
  • 18
    • 0346196669 scopus 로고    scopus 로고
    • New technique for decoding codes in the rank metric and its cryptography applications
    • Johansson T, Ourivski AV. New technique for decoding codes in the rank metric and its cryptography applications. Problems of Information Transmission 2002; 38(3): 237-246.
    • (2002) Problems of Information Transmission , vol.38 , Issue.3 , pp. 237-246
    • Johansson, T.1    Ourivski, A.V.2
  • 19
    • 51849145057 scopus 로고    scopus 로고
    • Cryptanalysis of MinRank. Advances in Cryptology-CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008, Proceedings. Series: Lecture Notes in Computer Science. Subseries: Security and Cryptology, Wagner, David (Ed.). Springer: Berlin, Heidelberg
    • Levy-dit-Vehel1 F, Jean-Charles Faug'ere J-Ch, Perret L. Cryptanalysis of MinRank. Advances in Cryptology-CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008, Proceedings. Series: Lecture Notes in Computer Science. Subseries: Security and Cryptology, Vol. 5157. Wagner, David (Ed.). Springer: Berlin, Heidelberg 2008. 280-296.
    • (2008) , vol.5157 , pp. 280-296
    • Levy-dit-Vehel1, F.1    Jean-Charles Faug'ere, J.-C.2    Perret, L.3
  • 20
    • 79960423315 scopus 로고    scopus 로고
    • Attacking and defending the McEliece cryptosystem, Second International Workshop, PQCrypto 2008 Proceedings, Cincinnati, OH, USA, 17-19
    • Bernstein JD, Lange T, Peters C. Attacking and defending the McEliece cryptosystem, Second International Workshop, PQCrypto 2008 Proceedings, Cincinnati, OH, USA, 17-19, 2008.
    • (2008)
    • Bernstein, J.D.1    Lange, T.2    Peters, C.3
  • 21
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21: 120-126.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.