메뉴 건너뛰기




Volumn 6584 LNCS, Issue , 2011, Pages 336-349

Quasi-dyadic CFS signatures

Author keywords

coding based cryptography; digital signatures; efficient parameters and algorithms; post quantum cryptography

Indexed keywords

CODING-BASED CRYPTOGRAPHY; DIGITAL SIGNATURE; EFFICIENT PARAMETERS AND ALGORITHMS; GOPPA CODES; KEY SIZES; POST QUANTUM CRYPTOGRAPHY; RANDOM SAMPLING; ERROR-CORRECTING;

EID: 79960814464     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-21518-6_23     Document Type: Conference Paper
Times cited : (18)

References (21)
  • 1
    • 70350633827 scopus 로고    scopus 로고
    • Reducing key length of the mcEliece cryptosystem
    • Preneel, B. (ed.) AFRICACRYPT 2009. Springer, Heidelberg
    • Berger, T.P., Cayrel, P.-L., Gaborit, P., Otmani, A.: Reducing key length of the mcEliece cryptosystem. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 77-97. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5580 , pp. 77-97
    • Berger, T.P.1    Cayrel, P.-L.2    Gaborit, P.3    Otmani, A.4
  • 3
    • 77954586130 scopus 로고    scopus 로고
    • Improved identity-based identification using correcting codes
    • abs/0903.0069
    • Cayrel, P.-L., Gaborit, P., Galindo, D., Girault, M.: Improved identity-based identification using correcting codes. CoRR, abs/0903.0069 (2009)
    • (2009) CoRR
    • Cayrel, P.-L.1    Gaborit, P.2    Galindo, D.3    Girault, M.4
  • 4
    • 84929461941 scopus 로고    scopus 로고
    • How to achieve a mcEliece-based digital signature scheme
    • Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
    • Courtois, N.T., Finiasz, M., Sendrier, N.: How to achieve a mcEliece-based digital signature scheme. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 157-174. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 157-174
    • Courtois, N.T.1    Finiasz, M.2    Sendrier, N.3
  • 5
    • 70349873550 scopus 로고    scopus 로고
    • Towards a concrete security proof of courtois, finiasz and sendrier signature scheme
    • Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) WEWoRC 2007. Springer, Heidelberg
    • Dallot, L.: Towards a concrete security proof of courtois, finiasz and sendrier signature scheme. In: Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) WEWoRC 2007. LNCS, vol. 4945, pp. 65-77. Springer, Heidelberg (2008), http://users.info.unicaen.fr/~ldallot/download/articles/CFSProof-dallot.pdf
    • (2008) LNCS , vol.4945 , pp. 65-77
    • Dallot, L.1
  • 6
    • 72449174214 scopus 로고    scopus 로고
    • Provably secure code-based threshold ring signatures
    • Parker, M.G. (ed.) CC 2009. Springer, Heidelberg
    • Dallot, L., Vergnaud, D.: Provably secure code-based threshold ring signatures. In: Parker, M.G. (ed.) CC 2009. LNCS, vol. 5921, pp. 222-235. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5921 , pp. 222-235
    • Dallot, L.1    Vergnaud, D.2
  • 7
    • 77954636190 scopus 로고    scopus 로고
    • Algebraic cryptanalysis of mcEliece variants with compact keys
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Faugère, J.-C., Otmani, A., Perret, L., Tillich, J.-P.: Algebraic cryptanalysis of mcEliece variants with compact keys. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 279-298. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 279-298
    • Faugère, J.-C.1    Otmani, A.2    Perret, L.3    Tillich, J.-P.4
  • 9
    • 72449174805 scopus 로고    scopus 로고
    • Security bounds for the design of code-based cryptosystems
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Finiasz, M., Sendrier, N.: Security bounds for the design of code-based cryptosystems. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 88-105. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 88-105
    • Finiasz, M.1    Sendrier, N.2
  • 11
    • 0015630603 scopus 로고
    • Simple matrix-theory proof of the discrete dyadic convolution theorem
    • Gulamhusein, M.N.: Simple matrix-theory proof of the discrete dyadic convolution theorem. Electronics Letters 9(10), 238-239 (1973)
    • (1973) Electronics Letters , vol.9 , Issue.10 , pp. 238-239
    • Gulamhusein, M.N.1
  • 12
    • 79960761871 scopus 로고    scopus 로고
    • Flexible quasi-dyadic code-based public-key encryption and signature
    • Kobara, K.: Flexible quasi-dyadic code-based public-key encryption and signature. Cryptology ePrint Archive, Report 2009/635 (2009)
    • (2009) Cryptology EPrint Archive, Report 2009/635
    • Kobara, K.1
  • 13
    • 0002448405 scopus 로고
    • A public-key cryptosystem based on algebraic coding theory
    • DSN PR 42-44
    • McEliece, R.: A public-key cryptosystem based on algebraic coding theory. The Deep Space Network Progress Report, DSN PR 42-44 (1978), http://ipnpr.jpl.nasa.gov/progressreport2/42-44/44N.PDF
    • (1978) The Deep Space Network Progress Report
    • McEliece, R.1
  • 14
    • 70549109066 scopus 로고    scopus 로고
    • Compact mcEliece keys from goppa codes
    • Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. Springer, Heidelberg
    • Misoczki, R., Barreto, P.S.L.M.: Compact mcEliece keys from goppa codes. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 376-392. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5867 , pp. 376-392
    • Misoczki, R.1    Barreto, P.S.L.M.2
  • 15
    • 0022582790 scopus 로고
    • Knapsack-type cryptosystems and algebraic coding theory
    • Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory 15(2), 159-166 (1986)
    • (1986) Problems of Control and Information Theory , vol.15 , Issue.2 , pp. 159-166
    • Niederreiter, H.1
  • 16
    • 77952289695 scopus 로고    scopus 로고
    • Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes
    • Otmani, A., Tillich, J.-P., Dallot, L.: Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes. Mathematics in Computer Science 3(2), 129-140 (2010)
    • (2010) Mathematics in Computer Science , vol.3 , Issue.2 , pp. 129-140
    • Otmani, A.1    Tillich, J.-P.2    Dallot, L.3
  • 19
    • 0142051871 scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing 26, 1484-1509 (1995)
    • (1995) SIAM Journal on Computing , vol.26 , pp. 1484-1509
    • Shor, P.W.1
  • 21
    • 56749122357 scopus 로고    scopus 로고
    • Code-based ring signature scheme
    • Zheng, D., Li, X., Chen, K.: Code-based ring signature scheme. I. J. Network Security 5(2), 154-157 (2007)
    • (2007) I. J. Network Security , vol.5 , Issue.2 , pp. 154-157
    • Zheng, D.1    Li, X.2    Chen, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.