-
1
-
-
56749180648
-
A new efficient threshold ring signature scheme based on coding theory
-
ser. Lecture Notes in Computer Science, J. Buchmann and J. Ding, Eds. Springer Berlin/Heidelberg
-
C. Aguilar Melchor, P.-L. Cayrel, and P. Gaborit, "A new efficient threshold ring signature scheme based on coding theory", in Post-Quantum Cryptography, ser. Lecture Notes in Computer Science, J. Buchmann and J. Ding, Eds. Springer Berlin/Heidelberg, 2008, vol. 5299, pp. 1-16.
-
(2008)
Post-Quantum Cryptography
, vol.5299
, pp. 1-16
-
-
Melchor, C.A.1
Cayrel, P.-L.2
Gaborit, P.3
-
2
-
-
23744478862
-
Linear diophantine equations over polynomials and soft decoding of Reed-Solomon codes
-
July
-
M. Alekhnovich, "Linear diophantine equations over polynomials and soft decoding of Reed-Solomon codes", Information Theory, IEEE Transactions on, vol. 51, no. 7, pp. 2257-2265, July 2005.
-
(2005)
Information Theory, IEEE Transactions on
, vol.51
, Issue.7
, pp. 2257-2265
-
-
Alekhnovich, M.1
-
3
-
-
80054825700
-
List-decoding of binary Goppa codes up to the binary Johnson bound
-
Online. Available
-
D. Augot, M. Barbier, and A. Couvreur, "List-decoding of binary Goppa codes up to the binary Johnson bound", INRIA Saclay, Tech. Rep., 2010. [Online]. Available: http://hal.archives-ouvertes.fr/inria-00547106/en/
-
(2010)
INRIA Saclay, Tech. Rep.
-
-
Augot, D.1
Barbier, M.2
Couvreur, A.3
-
4
-
-
77953904148
-
Recommendation for key management - Part 1: General (revised)
-
Online. Available
-
E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, "Recommendation for key management - part 1: General (revised)", NIST Special Publication 800-57, no. 1/3, pp. 1-142, 2007. [Online]. Available: http://csrc.nist.gov/ publications/nistpubs/800-57/sp800-57-Part1-revised2-Mar08-2007.pdf
-
(2007)
NIST Special Publication 800-57
, Issue.1-3
, pp. 1-142
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
5
-
-
78649424862
-
Efficient list decoding of a class of algebraicgeometry codes
-
P. Beelen and K. Brander, "Efficient list decoding of a class of algebraicgeometry codes", Advances in Mathematics of Communication, vol. 4, no. 4, pp. 485-518, 2010.
-
(2010)
Advances in Mathematics of Communication
, vol.4
, Issue.4
, pp. 485-518
-
-
Beelen, P.1
Brander, K.2
-
6
-
-
77952883693
-
Key equations for list decoding of Reed-Solomon codes and how to solve them
-
July, Online. Available
-
-, "Key equations for list decoding of Reed-Solomon codes and how to solve them", J. Symb. Comput., vol. 45, pp. 773-786, July 2010. [Online]. Available: http://dx.doi.org/10.1016/j.jsc.2010.03.010
-
(2010)
J. Symb. Comput.
, vol.45
, pp. 773-786
-
-
Beelen, P.1
Brander, K.2
-
7
-
-
70350633827
-
Reducing key length of the McEliece cryptosystem
-
ser. Lecture Notes in Computer Science, B. Preneel, Ed. Springer Berlin/Heidelberg
-
T. Berger, P.-L. Cayrel, P. Gaborit, and A. Otmani, "Reducing key length of the McEliece cryptosystem", in Progress in Cryptology - AFRICACRYPT 2009, ser. Lecture Notes in Computer Science, B. Preneel, Ed. Springer Berlin/Heidelberg, 2009, vol. 5580, pp. 77-97.
-
(2009)
Progress in Cryptology - AFRICACRYPT 2009
, vol.5580
, pp. 77-97
-
-
Berger, T.1
Cayrel, P.-L.2
Gaborit, P.3
Otmani, A.4
-
8
-
-
14844342361
-
How to mask the structure of codes for a cryptographic use
-
T. P. Berger and P. Loidreau, "How to mask the structure of codes for a cryptographic use", Designs, Codes and Cryptography, vol. 35, pp. 63-79, 2005.
-
(2005)
Designs, Codes and Cryptography
, vol.35
, pp. 63-79
-
-
Berger, T.P.1
Loidreau, P.2
-
9
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
May
-
E. Berlekamp, R. McEliece, and H. Van Tilborg, "On the inherent intractability of certain coding problems", Information Theory, IEEE Transactions on, vol. 24, no. 3, pp. 384-386, May 1978.
-
(1978)
Information Theory, IEEE Transactions on
, vol.24
, Issue.3
, pp. 384-386
-
-
Berlekamp, E.1
McEliece, R.2
Van Tilborg, H.3
-
14
-
-
56749164782
-
Attacking and defending the McEliece cryptosystem
-
ser. Lecture Notes in Computer Science, J. Buchmann and J. Ding, Eds. Springer Berlin/Heidelberg
-
D. Bernstein, T. Lange, and C. Peters, "Attacking and defending the McEliece cryptosystem", in Post-Quantum Cryptography, ser. Lecture Notes in Computer Science, J. Buchmann and J. Ding, Eds. Springer Berlin/Heidelberg, 2008, vol. 5299, pp. 31-46.
-
(2008)
Post-Quantum Cryptography
, vol.5299
, pp. 31-46
-
-
Bernstein, D.1
Lange, T.2
Peters, C.3
-
15
-
-
77954408261
-
Explicit bounds for generic decoding algorithms for code-based cryptography
-
May
-
-, "Explicit bounds for generic decoding algorithms for code-based cryptography", WCC 2009, pp. 168-180, May 2009.
-
(2009)
WCC 2009
, pp. 168-180
-
-
Bernstein, D.1
Lange, T.2
Peters, C.3
-
17
-
-
80054795812
-
Wild McEliece
-
Report 2010/410, 2010, accepted at SAC
-
-, "Wild McEliece", Cryptology ePrint Archive, Report 2010/410, 2010, accepted at SAC 2010.
-
(2010)
Cryptology ePrint Archive
-
-
Bernstein, D.1
Lange, T.2
Peters, C.3
-
19
-
-
77954636190
-
Algebraic cryptanalysis of McEliece variants with compact keys
-
ser. Lecture Notes in Computer Science, H. Gilbert, Ed. Springer Berlin/Heidelberg
-
J.-C. Faugère, A. Otmani, L. Perret, and J.-P. Tillich, "Algebraic cryptanalysis of McEliece variants with compact keys", in Advances in Cryptology - EUROCRYPT 2010, ser. Lecture Notes in Computer Science, H. Gilbert, Ed. Springer Berlin/Heidelberg, 2010, vol. 6110, pp. 279-298.
-
(2010)
Advances in Cryptology - EUROCRYPT 2010
, vol.6110
, pp. 279-298
-
-
Faugère, J.-C.1
Otmani, A.2
Perret, L.3
Tillich, J.-P.4
-
20
-
-
72449174805
-
Security bounds for the design of codebased cryptosystems
-
ser. Lecture Notes in Computer Science, M. Matsui, Ed. Springer Berlin/Heidelberg
-
M. Finiasz and N. Sendrier, "Security bounds for the design of codebased cryptosystems", in Advances in Cryptology - ASIACRYPT 2009, ser. Lecture Notes in Computer Science, M. Matsui, Ed. Springer Berlin/Heidelberg, 2009, vol. 5912, pp. 88-105.
-
(2009)
Advances in Cryptology - ASIACRYPT 2009
, vol.5912
, pp. 88-105
-
-
Finiasz, M.1
Sendrier, N.2
-
21
-
-
0033183669
-
Improved decoding of Reed-Solomon and algebraic-geometry codes
-
V. Guruswami and M. Sudan, "Improved decoding of Reed-Solomon and algebraic-geometry codes", Information Theory, IEEE transactions on, vol. 45, no. 6, pp. 1757-1767, 1999.
-
(1999)
Information Theory, IEEE Transactions on
, vol.45
, Issue.6
, pp. 1757-1767
-
-
Guruswami, V.1
Sudan, M.2
-
22
-
-
0028294826
-
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
-
Jan
-
Y. X. Li, R. Deng, and X. M. Wang, "On the equivalence of McEliece's and Niederreiter's public-key cryptosystems", Information Theory, IEEE Transactions on, vol. 40, no. 1, pp. 271-273, Jan. 1994.
-
(1994)
Information Theory, IEEE Transactions on
, vol.40
, Issue.1
, pp. 271-273
-
-
Li, Y.X.1
Deng, R.2
Wang, X.M.3
-
24
-
-
0002448405
-
A public-key cryptosystem based on algebraic coding theory
-
R. McEliece, "A public-key cryptosystem based on algebraic coding theory", Deep Space Network Progress Report, vol. 44, pp. 114-116, 1978.
-
(1978)
Deep Space Network Progress Report
, vol.44
, pp. 114-116
-
-
McEliece, R.1
-
25
-
-
70549109066
-
Compact McEliece keys from Goppa codes
-
ser. Lecture Notes in Computer Science, Springer, updated version
-
R. Misoczki and P. S. L. M. Barreto, "Compact McEliece keys from Goppa codes", in Selected Areas in Cryptography - SAC 2009, ser. Lecture Notes in Computer Science, vol. 5867. Springer, 2009, pp. 276-392, updated version: http://eprint.iacr.org/2009/187.
-
(2009)
Selected Areas in Cryptography - SAC 2009
, vol.5867
, pp. 276-392
-
-
Misoczki, R.1
Barreto, P.S.L.M.2
-
26
-
-
0022582790
-
Knapsack-type cryptosystems and algebraic coding theory
-
159-166
-
H. Niederreiter, "Knapsack-type cryptosystems and algebraic coding theory", Problems of Control and Information Theory, pp. 15(2):159-166, 1986.
-
(1986)
Problems of Control and Information Theory
, Issue.2
, pp. 15
-
-
Niederreiter, H.1
-
28
-
-
77952289695
-
Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes
-
A. Otmani, J.-P. Tillich, and L. Dallot, "Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes", Mathematics in Computer Science, vol. 3, pp. 129-140, 2010.
-
(2010)
Mathematics in Computer Science
, vol.3
, pp. 129-140
-
-
Otmani, A.1
Tillich, J.-P.2
Dallot, L.3
-
29
-
-
77954400700
-
Code-based cryptography
-
D. Bernstein, J. Buchmann, and E. Dahmen, Eds. Springer Berlin/Heidelberg
-
R. Overbeck and N. Sendrier, "Code-based cryptography", in Post-Quantum Cryptography, D. Bernstein, J. Buchmann, and E. Dahmen, Eds. Springer Berlin/Heidelberg, 2009, pp. 95-145.
-
(2009)
Post-Quantum Cryptography
, pp. 95-145
-
-
Overbeck, R.1
Sendrier, N.2
-
30
-
-
0016487667
-
The algebraic decoding of Goppa codes
-
Mar
-
N. Patterson, "The algebraic decoding of Goppa codes", Information Theory, IEEE Transactions on, vol. 21, no. 2, pp. 203-207, Mar. 1975.
-
(1975)
Information Theory, IEEE Transactions on
, vol.21
, Issue.2
, pp. 203-207
-
-
Patterson, N.1
-
31
-
-
84957795480
-
Chosen-ciphertext security for any one-way cryptosystem
-
ser. Lecture Notes in Computer Science, H. Imai and Y. Zheng, Eds. Springer Berlin/Heidelberg
-
D. Pointcheval, "Chosen-ciphertext security for any one-way cryptosystem", in Public Key Cryptography, ser. Lecture Notes in Computer Science, H. Imai and Y. Zheng, Eds. Springer Berlin/Heidelberg, 2000, vol. 1751, pp. 129-146.
-
(2000)
Public Key Cryptography
, vol.1751
, pp. 129-146
-
-
Pointcheval, D.1
-
32
-
-
84964937021
-
A method for finding codewords of small weight
-
ser. Lecture Notes in Computer Science, G. Cohen and J. Wolfmann, Eds. Springer Berlin/Heidelberg
-
J. Stern, "A method for finding codewords of small weight", in Coding Theory and Applications, ser. Lecture Notes in Computer Science, G. Cohen and J. Wolfmann, Eds. Springer Berlin/Heidelberg, 1989, vol. 388, pp. 106-113.
-
(1989)
Coding Theory and Applications
, vol.388
, pp. 106-113
-
-
Stern, J.1
-
33
-
-
80054795941
-
Sloppy Alice attacks! Adaptive chosen ciphertext attacks on the McEliece public-key cryptosystem
-
ed. by Mario Blaum. Boston: Kluwer Academic Publishers
-
E. Verheul, J. Doumen, and H. Van Tilborg, "Sloppy Alice attacks! Adaptive chosen ciphertext attacks on the McEliece public-key cryptosystem", in Information, coding and mathematics: proceedings of workshop honoring prof. Bob McEliece on his 60th birthday/ed. by Mario Blaum. Boston: Kluwer Academic Publishers, 2002, pp. 99-119.
-
(2002)
Information, Coding and Mathematics: Proceedings of Workshop Honoring Prof. Bob McEliece on His 60th Birthday
, pp. 99-119
-
-
Verheul, E.1
Doumen, J.2
Van Tilborg, H.3
|