-
1
-
-
0003777826
-
A public key cryptosystem based on algebraic coding theory
-
42-44, Pasadena, CA
-
McEliece RJ. A public key cryptosystem based on algebraic coding theory. In JPL DSN Progress Report 42-44, Pasadena, CA, 1978; 114-116.
-
(1978)
JPL DSN Progress Report
, pp. 114-116
-
-
McEliece, R.J.1
-
3
-
-
84935622001
-
Ideals over a non-commutative ring and their application in cryptology
-
Davies DW (ed.). Lecture Notes in Computer Science, No. 547. Springer-Verlag: Berlin and Heidelberg
-
Gabidulin EM, Paramonov AV, Tretjakov OV. Ideals over a non-commutative ring and their application in cryptology. In Advances in Cryptology-EUROCRYPT'91, Davies DW (ed.). Lecture Notes in Computer Science, No. 547. Springer-Verlag: Berlin and Heidelberg, 1991; 482-489.
-
(1991)
Advances in Cryptology-EUROCRYPT'91
, pp. 482-489
-
-
Gabidulin, E.M.1
Paramonov, A.V.2
Tretjakov, O.V.3
-
4
-
-
34547326126
-
-
Public-key cryptosystems based on linear codes over large alphabets: efficiency and weakness. In, Farrell PG (ed.). Formara Limited: Essex
-
Gabidulin EM. Public-key cryptosystems based on linear codes over large alphabets: efficiency and weakness. In Codes and Ciphers, Farrell PG (ed.). Formara Limited: Essex, 1995; 17-32.
-
(1995)
Codes and Ciphers
, pp. 17-32
-
-
Gabidulin, E.M.1
-
5
-
-
0346827230
-
Severely denting the Gabidulin version of the McEliece public key cryptosystem
-
Gibson JK. Severely denting the Gabidulin version of the McEliece public key cryptosystem. Designs, Codes and Cryptography 1995; 6(1): 37-45.
-
(1995)
Designs, Codes and Cryptography
, vol.6
, Issue.1
, pp. 37-45
-
-
Gibson, J.K.1
-
6
-
-
84947917832
-
The security of the Gabidulin public-key cryptosystem
-
LNCS. Springer-Verlag: Berlin, Heidelberg 1996;
-
Gibson JK. The security of the Gabidulin public-key cryptosystem. In Advances in Cryptology-EUROCRYPT'96, Maurer UM (ed). LNCS 1070. Springer-Verlag: Berlin, Heidelberg 1996; 212-223.
-
(1070)
Advances in Cryptology-EUROCRYPT'96, Maurer UM (ed)
, pp. 212-223
-
-
Gibson, J.K.1
-
7
-
-
0010073595
-
Improved GPT public key cryptosystems
-
Honary B (eds). Research Studies Press, London
-
Gabidulin EM, Ourivski AV. Improved GPT public key cryptosystems. In Coding, Communications, and Broadcasting, Farrell P, Darnell M, Honary B (eds). Research Studies Press, London, 2000; 73-102.
-
(2000)
Coding, Communications, and Broadcasting
, pp. 73-102
-
-
Gabidulin, E.M.1
Ourivski, A.V.2
Farrell, P.3
Darnell, M.4
-
9
-
-
0346076640
-
Reducible rank codes and their applications to cryptography
-
Gabidulin EM, Ourivski AV, Honary B, Ammar B. Reducible rank codes and their applications to cryptography. IEEE Transactions on Information Theory 2003; 49(12): 3289-3293.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.12
, pp. 3289-3293
-
-
Gabidulin, E.M.1
Ourivski, A.V.2
Honary, B.3
Ammar, B.4
-
10
-
-
79960393434
-
-
High-weight errors in public-key cryptosystems based on reducible rank codes. In Proceedings of ISCTA
-
Kshevetskiy AS, Gabidulin EM. High-weight errors in public-key cryptosystems based on reducible rank codes. In Proceedings of ISCTA, 2005.
-
(2005)
-
-
Kshevetskiy, A.S.1
Gabidulin, E.M.2
-
11
-
-
43949117635
-
-
A new brute-force attack for GPT and variants. In Proceedings of Mycrypt'2005, of LNCS. Springer-Verlag
-
Overbeck R. A new brute-force attack for GPT and variants. In Proceedings of Mycrypt'2005, Vol. 3517 of LNCS. Springer-Verlag, 2005; 5-63.
-
(2005)
, vol.3517
, pp. 5-63
-
-
Overbeck, R.1
-
12
-
-
43249125012
-
Brute-force attacks public key cryptosystem based on Gabidulin codes
-
Overbeck R. Brute-force attacks public key cryptosystem based on Gabidulin codes. Journal of Cryptology 2008; 21(2): 280-301.
-
(2008)
Journal of Cryptology
, vol.21
, Issue.2
, pp. 280-301
-
-
Overbeck, R.1
-
13
-
-
48049107481
-
-
Security of GPT-like cryptosystems based on linear rank codes. Signal Design and Its Applications in Communications, IWSDA 2007. On page(s)
-
Kshevetskiy AS. Security of GPT-like cryptosystems based on linear rank codes. Signal Design and Its Applications in Communications, 2007. IWSDA 2007. On page(s): 143-147.
-
(2007)
, pp. 143-147
-
-
Kshevetskiy, A.S.1
-
14
-
-
43949122880
-
Attacks and counter-attacks on the GPT public key cryptosystem
-
DOI 10.1007/s10623-007-9160-8
-
Gabidulin EM. Attacks and counter-attacks on the GPT public key cryptosystem. Designs, Codes and Cryptography 2008; 48(2): 171-177. DOI 10.1007/s10623-007-9160-8.
-
(2008)
Designs, Codes and Cryptography
, vol.48
, Issue.2
, pp. 171-177
-
-
Gabidulin, E.M.1
-
17
-
-
85013087026
-
A fast matrix decoding algorithm for rank-error-correcting codes
-
Cohen G, Litsyn S, Lobstein A, Zemor G (eds). Lecture Notes in Computer Science No. 573, Springer-Verlag: Berlin
-
Gabidulin EM. A fast matrix decoding algorithm for rank-error-correcting codes. In Algebraic Coding, Cohen G, Litsyn S, Lobstein A, Zemor G (eds). Lecture Notes in Computer Science No. 573, Springer-Verlag: Berlin, 1992; 126-132.
-
(1992)
Algebraic Coding
, pp. 126-132
-
-
Gabidulin, E.M.1
-
18
-
-
0346196669
-
New technique for decoding codes in the rank metric and its cryptography applications
-
Johansson T, Ourivski AV. New technique for decoding codes in the rank metric and its cryptography applications. Problems of Information Transmission 2002; 38(3): 237-246.
-
(2002)
Problems of Information Transmission
, vol.38
, Issue.3
, pp. 237-246
-
-
Johansson, T.1
Ourivski, A.V.2
-
19
-
-
51849145057
-
-
Cryptanalysis of MinRank. Advances in Cryptology-CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008, Proceedings. Series: Lecture Notes in Computer Science. Subseries: Security and Cryptology, Wagner, David (Ed.). Springer: Berlin, Heidelberg
-
Levy-dit-Vehel1 F, Jean-Charles Faug'ere J-Ch, Perret L. Cryptanalysis of MinRank. Advances in Cryptology-CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008, Proceedings. Series: Lecture Notes in Computer Science. Subseries: Security and Cryptology, Vol. 5157. Wagner, David (Ed.). Springer: Berlin, Heidelberg 2008. 280-296.
-
(2008)
, vol.5157
, pp. 280-296
-
-
Levy-dit-Vehel1, F.1
Jean-Charles Faug'ere, J.-C.2
Perret, L.3
-
20
-
-
79960423315
-
-
Attacking and defending the McEliece cryptosystem, Second International Workshop, PQCrypto 2008 Proceedings, Cincinnati, OH, USA, 17-19
-
Bernstein JD, Lange T, Peters C. Attacking and defending the McEliece cryptosystem, Second International Workshop, PQCrypto 2008 Proceedings, Cincinnati, OH, USA, 17-19, 2008.
-
(2008)
-
-
Bernstein, J.D.1
Lange, T.2
Peters, C.3
-
21
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21: 120-126.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
|