-
1
-
-
70350633827
-
Reducing key length of the mcEliece cryptosystem
-
Preneel, B. (ed.) AFRICACRYPT 2009. Springer, Heidelberg
-
Berger, T.P., Cayrel, P.-L., Gaborit, P., Otmani, A.: Reducing key length of the mcEliece cryptosystem. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 77-97. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5580
, pp. 77-97
-
-
Berger, T.P.1
Cayrel, P.-L.2
Gaborit, P.3
Otmani, A.4
-
3
-
-
77954586130
-
Improved identity-based identification using correcting codes
-
abs/0903.0069
-
Cayrel, P.-L., Gaborit, P., Galindo, D., Girault, M.: Improved identity-based identification using correcting codes. CoRR, abs/0903.0069 (2009)
-
(2009)
CoRR
-
-
Cayrel, P.-L.1
Gaborit, P.2
Galindo, D.3
Girault, M.4
-
4
-
-
84929461941
-
How to achieve a mcEliece-based digital signature scheme
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Courtois, N.T., Finiasz, M., Sendrier, N.: How to achieve a mcEliece-based digital signature scheme. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 157-174. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 157-174
-
-
Courtois, N.T.1
Finiasz, M.2
Sendrier, N.3
-
5
-
-
70349873550
-
Towards a concrete security proof of courtois, finiasz and sendrier signature scheme
-
Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) WEWoRC 2007. Springer, Heidelberg
-
Dallot, L.: Towards a concrete security proof of courtois, finiasz and sendrier signature scheme. In: Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) WEWoRC 2007. LNCS, vol. 4945, pp. 65-77. Springer, Heidelberg (2008), http://users.info.unicaen.fr/~ldallot/download/articles/CFSProof-dallot.pdf
-
(2008)
LNCS
, vol.4945
, pp. 65-77
-
-
Dallot, L.1
-
6
-
-
72449174214
-
Provably secure code-based threshold ring signatures
-
Parker, M.G. (ed.) CC 2009. Springer, Heidelberg
-
Dallot, L., Vergnaud, D.: Provably secure code-based threshold ring signatures. In: Parker, M.G. (ed.) CC 2009. LNCS, vol. 5921, pp. 222-235. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5921
, pp. 222-235
-
-
Dallot, L.1
Vergnaud, D.2
-
7
-
-
77954636190
-
Algebraic cryptanalysis of mcEliece variants with compact keys
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Faugère, J.-C., Otmani, A., Perret, L., Tillich, J.-P.: Algebraic cryptanalysis of mcEliece variants with compact keys. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 279-298. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 279-298
-
-
Faugère, J.-C.1
Otmani, A.2
Perret, L.3
Tillich, J.-P.4
-
8
-
-
79960766850
-
A distinguisher for high rate mceliece cryptosystems
-
Faugère, J.-C., Otmani, A., Perret, L., Tillich, J.-P.: A distinguisher for high rate mceliece cryptosystems. Cryptology ePrint Archive, Report 2010/331 (2010), http://eprint.iacr.org/
-
(2010)
Cryptology EPrint Archive, Report 2010/331
-
-
Faugère, J.-C.1
Otmani, A.2
Perret, L.3
Tillich, J.-P.4
-
9
-
-
72449174805
-
Security bounds for the design of code-based cryptosystems
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Finiasz, M., Sendrier, N.: Security bounds for the design of code-based cryptosystems. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 88-105. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 88-105
-
-
Finiasz, M.1
Sendrier, N.2
-
10
-
-
51649128710
-
Shorter keys for code based cryptography
-
ACM Press, New York
-
Gaborit, P.: Shorter keys for code based cryptography. In: International Workshop on Coding and Cryptography - WCC 2005, Bergen, Norway, pp. 81-91. ACM Press, New York (2005)
-
(2005)
International Workshop on Coding and Cryptography - WCC 2005, Bergen, Norway
, pp. 81-91
-
-
Gaborit, P.1
-
11
-
-
0015630603
-
Simple matrix-theory proof of the discrete dyadic convolution theorem
-
Gulamhusein, M.N.: Simple matrix-theory proof of the discrete dyadic convolution theorem. Electronics Letters 9(10), 238-239 (1973)
-
(1973)
Electronics Letters
, vol.9
, Issue.10
, pp. 238-239
-
-
Gulamhusein, M.N.1
-
12
-
-
79960761871
-
Flexible quasi-dyadic code-based public-key encryption and signature
-
Kobara, K.: Flexible quasi-dyadic code-based public-key encryption and signature. Cryptology ePrint Archive, Report 2009/635 (2009)
-
(2009)
Cryptology EPrint Archive, Report 2009/635
-
-
Kobara, K.1
-
13
-
-
0002448405
-
A public-key cryptosystem based on algebraic coding theory
-
DSN PR 42-44
-
McEliece, R.: A public-key cryptosystem based on algebraic coding theory. The Deep Space Network Progress Report, DSN PR 42-44 (1978), http://ipnpr.jpl.nasa.gov/progressreport2/42-44/44N.PDF
-
(1978)
The Deep Space Network Progress Report
-
-
McEliece, R.1
-
14
-
-
70549109066
-
Compact mcEliece keys from goppa codes
-
Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. Springer, Heidelberg
-
Misoczki, R., Barreto, P.S.L.M.: Compact mcEliece keys from goppa codes. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 376-392. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5867
, pp. 376-392
-
-
Misoczki, R.1
Barreto, P.S.L.M.2
-
15
-
-
0022582790
-
Knapsack-type cryptosystems and algebraic coding theory
-
Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory 15(2), 159-166 (1986)
-
(1986)
Problems of Control and Information Theory
, vol.15
, Issue.2
, pp. 159-166
-
-
Niederreiter, H.1
-
16
-
-
77952289695
-
Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes
-
Otmani, A., Tillich, J.-P., Dallot, L.: Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes. Mathematics in Computer Science 3(2), 129-140 (2010)
-
(2010)
Mathematics in Computer Science
, vol.3
, Issue.2
, pp. 129-140
-
-
Otmani, A.1
Tillich, J.-P.2
Dallot, L.3
-
19
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing 26, 1484-1509 (1995)
-
(1995)
SIAM Journal on Computing
, vol.26
, pp. 1484-1509
-
-
Shor, P.W.1
-
21
-
-
56749122357
-
Code-based ring signature scheme
-
Zheng, D., Li, X., Chen, K.: Code-based ring signature scheme. I. J. Network Security 5(2), 154-157 (2007)
-
(2007)
I. J. Network Security
, vol.5
, Issue.2
, pp. 154-157
-
-
Zheng, D.1
Li, X.2
Chen, K.3
|