-
1
-
-
56749164782
-
Attacking and defending the mcEliece cryptosystem
-
Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
-
Bernstein, D.J., Lange, T., Peters, C.: Attacking and defending the mcEliece cryptosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5299
, pp. 31-46
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
2
-
-
84929461941
-
How to achieve a mcEliece-based digital signature scheme
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Courtois, N., Finiasz, M., Sendrier, N.: How to achieve a mcEliece-based digital signature scheme. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 157-174. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 157-174
-
-
Courtois, N.1
Finiasz, M.2
Sendrier, N.3
-
3
-
-
80052019237
-
-
preprint
-
Dinh, H., Moore, C., Russell, A.: The McEliece cryptosystem resists quantum Fourier sampling attacks, preprint (2010), http://arxiv.org/abs/1008. 2390
-
(2010)
The McEliece Cryptosystem Resists Quantum Fourier Sampling Attacks
-
-
Dinh, H.1
Moore, C.2
Russell, A.3
-
4
-
-
84858691417
-
A summary of McEliece-type cryptosystems and their security
-
Engelbert, D., Overbeck, R., Schmidt, A.: A summary of McEliece-type cryptosystems and their security. J. Math. Crypt. 1, 151-199 (2007)
-
(2007)
J. Math. Crypt.
, vol.1
, pp. 151-199
-
-
Engelbert, D.1
Overbeck, R.2
Schmidt, A.3
-
6
-
-
2542631212
-
Quantum mechanical algorithms for the nonabelian hidden subgroup problem
-
Grigni,M., Schulman, J., Vazirani,M., Vazirani, U.: Quantum mechanical algorithms for the nonabelian hidden subgroup problem. Combinatorica 24(1), 137-154 (2004)
-
(2004)
Combinatorica
, vol.24
, Issue.1
, pp. 137-154
-
-
Schulman, J.1
Vazirani, M.2
Vazirani, U.3
-
7
-
-
33748123212
-
Limitations of quantum coset states for graph isomorphism
-
Hallgren, S., Moore, C., Rötteler, M., Russell, A., Sen, P.: Limitations of quantum coset states for graph isomorphism. In: STOC 2006: Proceedings of the Thirty-Eighth Annual ACM Symposium on Theory of Computing, pp. 604-617 (2006)
-
(2006)
STOC 2006: Proceedings of the Thirty-Eighth Annual ACM Symposium on Theory of Computing
, pp. 604-617
-
-
Hallgren, S.1
Moore, C.2
Rötteler, M.3
Russell, A.4
Sen, P.5
-
9
-
-
58549105178
-
Permutation groups, minimal degrees and quantum computing
-
Kempe, J., Pyber, L., Shalev, A.: Permutation groups, minimal degrees and quantum computing. Groups, Geometry, and Dynamics 1(4), 553-584 (2007), http://xxx.lanl.gov/abs/quant-ph/0607204
-
(2007)
Groups, Geometry, and Dynamics
, vol.1
, Issue.4
, pp. 553-584
-
-
Kempe, J.1
Pyber, L.2
Shalev, A.3
-
10
-
-
0028294826
-
On the equivalence ofMcElieces and Niederreiters publickey cryptosystems
-
Li,Y.X., Deng, R.H.,Wang, X.M.:On the equivalence ofMcElieces and Niederreiters publickey cryptosystems. IEEE Transactions on Information Theory 40(1), 271-273 (1994)
-
(1994)
IEEE Transactions on Information Theory
, vol.40
, Issue.1
, pp. 271-273
-
-
Li, Y.X.1
Deng, R.H.2
Wang, X.M.3
-
13
-
-
0002448405
-
A public-key cryptosystem based on algebraic coding theory
-
McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. JPL DSN Progress Report, 114-116 (1978)
-
(1978)
JPL DSN Progress Report
, pp. 114-116
-
-
McEliece, R.J.1
-
14
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
15
-
-
55249094588
-
The symmetric group defies strong quantum Fourier sampling
-
Moore, C., Russell, A., Schulman, L.J.: The symmetric group defies strong quantum Fourier sampling. SIAM Journal of Computing 37, 1842-1864 (2008)
-
(2008)
SIAM Journal of Computing
, vol.37
, pp. 1842-1864
-
-
Moore, C.1
Russell, A.2
Schulman, L.J.3
-
16
-
-
0022582790
-
Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory
-
Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory. Problemy Upravlenija i Teorii Informacii 15(2), 159-166 (1986)
-
(1986)
Problemy Upravlenija I Teorii Informacii
, vol.15
, Issue.2
, pp. 159-166
-
-
Niederreiter, H.1
-
17
-
-
0031236411
-
Is code equivalence easy to decide?
-
doi:10.1109/18.623157
-
Petrank, E., Roth, R.M.: Is code equivalence easy to decide? IEEE Transactions on Information Theory 43(5), 1602-1604 (1997), doi:10.1109/18. 623157
-
(1997)
IEEE Transactions on Information Theory
, vol.43
, Issue.5
, pp. 1602-1604
-
-
Petrank, E.1
Roth, R.M.2
-
18
-
-
33745571012
-
On lattices, learning with errors, random linear codes, and cryptography
-
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: STOC 2005: Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing, pp. 84-93 (2005)
-
(2005)
STOC 2005: Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing
, pp. 84-93
-
-
Regev, O.1
-
19
-
-
0030502729
-
Upper bound on the characters of the symmetric groups
-
Roichman, Y.: Upper bound on the characters of the symmetric groups. Invent. Math. 125(3), 451-485 (1996)
-
(1996)
Invent. Math.
, vol.125
, Issue.3
, pp. 451-485
-
-
Roichman, Y.1
-
20
-
-
48649088483
-
Excluding some weak keys in the McEliece cryptosystem
-
Ryan, J.A.: Excluding some weak keys in the McEliece cryptosystem. In: Proceedings of the 8th IEEE Africon, pp. 1-5 (2007)
-
(2007)
Proceedings of the 8th IEEE Africon
, pp. 1-5
-
-
Ryan, J.A.1
-
21
-
-
0034226112
-
Finding the permutation between equivalent linear codes: The support splitting algorithm
-
Sendrier, N.: Finding the permutation between equivalent linear codes: the support splitting algorithm. IEEE Transactions on Information Theory 46(4), 1193-1203 (2000)
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1193-1203
-
-
Sendrier, N.1
-
22
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing 26, 1484-1509 (1997)
-
(1997)
SIAM Journal on Computing
, vol.26
, pp. 1484-1509
-
-
Shor, P.W.1
-
23
-
-
84929257781
-
On insecurity of cryptosystems based on generalized Reed-Solomon codes
-
Sidelnikov, V.M., Shestakov, S.O.: On insecurity of cryptosystems based on generalized Reed-Solomon codes. Discrete Mathematics and Applications 2(4), 439-444 (1992)
-
(1992)
Discrete Mathematics and Applications
, vol.2
, Issue.4
, pp. 439-444
-
-
Sidelnikov, V.M.1
Shestakov, S.O.2
-
24
-
-
0009438294
-
On the power of quantum computation
-
Simon, D.R.: On the power of quantum computation. SIAM J. Comput. 26(5), 1474-1483 (1997)
-
(1997)
SIAM J. Comput.
, vol.26
, Issue.5
, pp. 1474-1483
-
-
Simon, D.R.1
-
25
-
-
38249018842
-
On automorphisms of geometric Goppa codes
-
Stichtenoth, H.: On automorphisms of geometric Goppa codes. Journal of Algebra 130, 113-121 (1990)
-
(1990)
Journal of Algebra
, vol.130
, pp. 113-121
-
-
Stichtenoth, H.1
|