메뉴 건너뛰기




Volumn 6841 LNCS, Issue , 2011, Pages 761-779

McEliece and Niederreiter cryptosystems that resist quantum Fourier sampling attacks

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); FOURIER TRANSFORMS; GRAPH ALGORITHMS; PUBLIC KEY CRYPTOGRAPHY; QUANTUM COMPUTERS; QUANTUM THEORY;

EID: 80052020068     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22792-9_43     Document Type: Conference Paper
Times cited : (38)

References (26)
  • 1
    • 56749164782 scopus 로고    scopus 로고
    • Attacking and defending the mcEliece cryptosystem
    • Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
    • Bernstein, D.J., Lange, T., Peters, C.: Attacking and defending the mcEliece cryptosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5299 , pp. 31-46
    • Bernstein, D.J.1    Lange, T.2    Peters, C.3
  • 2
    • 84929461941 scopus 로고    scopus 로고
    • How to achieve a mcEliece-based digital signature scheme
    • Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
    • Courtois, N., Finiasz, M., Sendrier, N.: How to achieve a mcEliece-based digital signature scheme. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 157-174. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 157-174
    • Courtois, N.1    Finiasz, M.2    Sendrier, N.3
  • 4
    • 84858691417 scopus 로고    scopus 로고
    • A summary of McEliece-type cryptosystems and their security
    • Engelbert, D., Overbeck, R., Schmidt, A.: A summary of McEliece-type cryptosystems and their security. J. Math. Crypt. 1, 151-199 (2007)
    • (2007) J. Math. Crypt. , vol.1 , pp. 151-199
    • Engelbert, D.1    Overbeck, R.2    Schmidt, A.3
  • 6
    • 2542631212 scopus 로고    scopus 로고
    • Quantum mechanical algorithms for the nonabelian hidden subgroup problem
    • Grigni,M., Schulman, J., Vazirani,M., Vazirani, U.: Quantum mechanical algorithms for the nonabelian hidden subgroup problem. Combinatorica 24(1), 137-154 (2004)
    • (2004) Combinatorica , vol.24 , Issue.1 , pp. 137-154
    • Schulman, J.1    Vazirani, M.2    Vazirani, U.3
  • 9
    • 58549105178 scopus 로고    scopus 로고
    • Permutation groups, minimal degrees and quantum computing
    • Kempe, J., Pyber, L., Shalev, A.: Permutation groups, minimal degrees and quantum computing. Groups, Geometry, and Dynamics 1(4), 553-584 (2007), http://xxx.lanl.gov/abs/quant-ph/0607204
    • (2007) Groups, Geometry, and Dynamics , vol.1 , Issue.4 , pp. 553-584
    • Kempe, J.1    Pyber, L.2    Shalev, A.3
  • 10
    • 0028294826 scopus 로고
    • On the equivalence ofMcElieces and Niederreiters publickey cryptosystems
    • Li,Y.X., Deng, R.H.,Wang, X.M.:On the equivalence ofMcElieces and Niederreiters publickey cryptosystems. IEEE Transactions on Information Theory 40(1), 271-273 (1994)
    • (1994) IEEE Transactions on Information Theory , vol.40 , Issue.1 , pp. 271-273
    • Li, Y.X.1    Deng, R.H.2    Wang, X.M.3
  • 13
    • 0002448405 scopus 로고
    • A public-key cryptosystem based on algebraic coding theory
    • McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. JPL DSN Progress Report, 114-116 (1978)
    • (1978) JPL DSN Progress Report , pp. 114-116
    • McEliece, R.J.1
  • 15
    • 55249094588 scopus 로고    scopus 로고
    • The symmetric group defies strong quantum Fourier sampling
    • Moore, C., Russell, A., Schulman, L.J.: The symmetric group defies strong quantum Fourier sampling. SIAM Journal of Computing 37, 1842-1864 (2008)
    • (2008) SIAM Journal of Computing , vol.37 , pp. 1842-1864
    • Moore, C.1    Russell, A.2    Schulman, L.J.3
  • 16
    • 0022582790 scopus 로고
    • Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory
    • Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory. Problemy Upravlenija i Teorii Informacii 15(2), 159-166 (1986)
    • (1986) Problemy Upravlenija I Teorii Informacii , vol.15 , Issue.2 , pp. 159-166
    • Niederreiter, H.1
  • 17
    • 0031236411 scopus 로고    scopus 로고
    • Is code equivalence easy to decide?
    • doi:10.1109/18.623157
    • Petrank, E., Roth, R.M.: Is code equivalence easy to decide? IEEE Transactions on Information Theory 43(5), 1602-1604 (1997), doi:10.1109/18. 623157
    • (1997) IEEE Transactions on Information Theory , vol.43 , Issue.5 , pp. 1602-1604
    • Petrank, E.1    Roth, R.M.2
  • 19
    • 0030502729 scopus 로고    scopus 로고
    • Upper bound on the characters of the symmetric groups
    • Roichman, Y.: Upper bound on the characters of the symmetric groups. Invent. Math. 125(3), 451-485 (1996)
    • (1996) Invent. Math. , vol.125 , Issue.3 , pp. 451-485
    • Roichman, Y.1
  • 20
    • 48649088483 scopus 로고    scopus 로고
    • Excluding some weak keys in the McEliece cryptosystem
    • Ryan, J.A.: Excluding some weak keys in the McEliece cryptosystem. In: Proceedings of the 8th IEEE Africon, pp. 1-5 (2007)
    • (2007) Proceedings of the 8th IEEE Africon , pp. 1-5
    • Ryan, J.A.1
  • 21
    • 0034226112 scopus 로고    scopus 로고
    • Finding the permutation between equivalent linear codes: The support splitting algorithm
    • Sendrier, N.: Finding the permutation between equivalent linear codes: the support splitting algorithm. IEEE Transactions on Information Theory 46(4), 1193-1203 (2000)
    • (2000) IEEE Transactions on Information Theory , vol.46 , Issue.4 , pp. 1193-1203
    • Sendrier, N.1
  • 22
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing 26, 1484-1509 (1997)
    • (1997) SIAM Journal on Computing , vol.26 , pp. 1484-1509
    • Shor, P.W.1
  • 23
    • 84929257781 scopus 로고
    • On insecurity of cryptosystems based on generalized Reed-Solomon codes
    • Sidelnikov, V.M., Shestakov, S.O.: On insecurity of cryptosystems based on generalized Reed-Solomon codes. Discrete Mathematics and Applications 2(4), 439-444 (1992)
    • (1992) Discrete Mathematics and Applications , vol.2 , Issue.4 , pp. 439-444
    • Sidelnikov, V.M.1    Shestakov, S.O.2
  • 24
    • 0009438294 scopus 로고    scopus 로고
    • On the power of quantum computation
    • Simon, D.R.: On the power of quantum computation. SIAM J. Comput. 26(5), 1474-1483 (1997)
    • (1997) SIAM J. Comput. , vol.26 , Issue.5 , pp. 1474-1483
    • Simon, D.R.1
  • 25
    • 38249018842 scopus 로고
    • On automorphisms of geometric Goppa codes
    • Stichtenoth, H.: On automorphisms of geometric Goppa codes. Journal of Algebra 130, 113-121 (1990)
    • (1990) Journal of Algebra , vol.130 , pp. 113-121
    • Stichtenoth, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.