메뉴 건너뛰기




Volumn , Issue , 2011, Pages 2681-2685

Key reduction of McEliece's cryptosystem using list decoding

Author keywords

[No Author keywords available]

Indexed keywords

GOPPA CODES; KEY-REDUCTION; LIST DECODING; MCELIECE; MCELIECE CRYPTOSYSTEM; NEW STUDY; PUBLIC KEYS; SECURITY LEVEL; STRUCTURED CODES;

EID: 80054803850     PISSN: 21578104     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2011.6034058     Document Type: Conference Paper
Times cited : (20)

References (33)
  • 1
    • 56749180648 scopus 로고    scopus 로고
    • A new efficient threshold ring signature scheme based on coding theory
    • ser. Lecture Notes in Computer Science, J. Buchmann and J. Ding, Eds. Springer Berlin/Heidelberg
    • C. Aguilar Melchor, P.-L. Cayrel, and P. Gaborit, "A new efficient threshold ring signature scheme based on coding theory", in Post-Quantum Cryptography, ser. Lecture Notes in Computer Science, J. Buchmann and J. Ding, Eds. Springer Berlin/Heidelberg, 2008, vol. 5299, pp. 1-16.
    • (2008) Post-Quantum Cryptography , vol.5299 , pp. 1-16
    • Melchor, C.A.1    Cayrel, P.-L.2    Gaborit, P.3
  • 2
    • 23744478862 scopus 로고    scopus 로고
    • Linear diophantine equations over polynomials and soft decoding of Reed-Solomon codes
    • July
    • M. Alekhnovich, "Linear diophantine equations over polynomials and soft decoding of Reed-Solomon codes", Information Theory, IEEE Transactions on, vol. 51, no. 7, pp. 2257-2265, July 2005.
    • (2005) Information Theory, IEEE Transactions on , vol.51 , Issue.7 , pp. 2257-2265
    • Alekhnovich, M.1
  • 3
    • 80054825700 scopus 로고    scopus 로고
    • List-decoding of binary Goppa codes up to the binary Johnson bound
    • Online. Available
    • D. Augot, M. Barbier, and A. Couvreur, "List-decoding of binary Goppa codes up to the binary Johnson bound", INRIA Saclay, Tech. Rep., 2010. [Online]. Available: http://hal.archives-ouvertes.fr/inria-00547106/en/
    • (2010) INRIA Saclay, Tech. Rep.
    • Augot, D.1    Barbier, M.2    Couvreur, A.3
  • 4
    • 77953904148 scopus 로고    scopus 로고
    • Recommendation for key management - Part 1: General (revised)
    • Online. Available
    • E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, "Recommendation for key management - part 1: General (revised)", NIST Special Publication 800-57, no. 1/3, pp. 1-142, 2007. [Online]. Available: http://csrc.nist.gov/ publications/nistpubs/800-57/sp800-57-Part1-revised2-Mar08-2007.pdf
    • (2007) NIST Special Publication 800-57 , Issue.1-3 , pp. 1-142
    • Barker, E.1    Barker, W.2    Burr, W.3    Polk, W.4    Smid, M.5
  • 5
    • 78649424862 scopus 로고    scopus 로고
    • Efficient list decoding of a class of algebraicgeometry codes
    • P. Beelen and K. Brander, "Efficient list decoding of a class of algebraicgeometry codes", Advances in Mathematics of Communication, vol. 4, no. 4, pp. 485-518, 2010.
    • (2010) Advances in Mathematics of Communication , vol.4 , Issue.4 , pp. 485-518
    • Beelen, P.1    Brander, K.2
  • 6
    • 77952883693 scopus 로고    scopus 로고
    • Key equations for list decoding of Reed-Solomon codes and how to solve them
    • July, Online. Available
    • -, "Key equations for list decoding of Reed-Solomon codes and how to solve them", J. Symb. Comput., vol. 45, pp. 773-786, July 2010. [Online]. Available: http://dx.doi.org/10.1016/j.jsc.2010.03.010
    • (2010) J. Symb. Comput. , vol.45 , pp. 773-786
    • Beelen, P.1    Brander, K.2
  • 7
    • 70350633827 scopus 로고    scopus 로고
    • Reducing key length of the McEliece cryptosystem
    • ser. Lecture Notes in Computer Science, B. Preneel, Ed. Springer Berlin/Heidelberg
    • T. Berger, P.-L. Cayrel, P. Gaborit, and A. Otmani, "Reducing key length of the McEliece cryptosystem", in Progress in Cryptology - AFRICACRYPT 2009, ser. Lecture Notes in Computer Science, B. Preneel, Ed. Springer Berlin/Heidelberg, 2009, vol. 5580, pp. 77-97.
    • (2009) Progress in Cryptology - AFRICACRYPT 2009 , vol.5580 , pp. 77-97
    • Berger, T.1    Cayrel, P.-L.2    Gaborit, P.3    Otmani, A.4
  • 8
    • 14844342361 scopus 로고    scopus 로고
    • How to mask the structure of codes for a cryptographic use
    • T. P. Berger and P. Loidreau, "How to mask the structure of codes for a cryptographic use", Designs, Codes and Cryptography, vol. 35, pp. 63-79, 2005.
    • (2005) Designs, Codes and Cryptography , vol.35 , pp. 63-79
    • Berger, T.P.1    Loidreau, P.2
  • 14
    • 56749164782 scopus 로고    scopus 로고
    • Attacking and defending the McEliece cryptosystem
    • ser. Lecture Notes in Computer Science, J. Buchmann and J. Ding, Eds. Springer Berlin/Heidelberg
    • D. Bernstein, T. Lange, and C. Peters, "Attacking and defending the McEliece cryptosystem", in Post-Quantum Cryptography, ser. Lecture Notes in Computer Science, J. Buchmann and J. Ding, Eds. Springer Berlin/Heidelberg, 2008, vol. 5299, pp. 31-46.
    • (2008) Post-Quantum Cryptography , vol.5299 , pp. 31-46
    • Bernstein, D.1    Lange, T.2    Peters, C.3
  • 15
    • 77954408261 scopus 로고    scopus 로고
    • Explicit bounds for generic decoding algorithms for code-based cryptography
    • May
    • -, "Explicit bounds for generic decoding algorithms for code-based cryptography", WCC 2009, pp. 168-180, May 2009.
    • (2009) WCC 2009 , pp. 168-180
    • Bernstein, D.1    Lange, T.2    Peters, C.3
  • 18
    • 80054802288 scopus 로고    scopus 로고
    • A summary of McEliecetype cryptosystems and their security
    • Report 2006/162
    • D. Engelbert, R. Overbeck, and A. Schmidt, "A summary of McEliecetype cryptosystems and their security", Cryptology ePrint Archive, Report 2006/162, 2006.
    • (2006) Cryptology EPrint Archive
    • Engelbert, D.1    Overbeck, R.2    Schmidt, A.3
  • 19
    • 77954636190 scopus 로고    scopus 로고
    • Algebraic cryptanalysis of McEliece variants with compact keys
    • ser. Lecture Notes in Computer Science, H. Gilbert, Ed. Springer Berlin/Heidelberg
    • J.-C. Faugère, A. Otmani, L. Perret, and J.-P. Tillich, "Algebraic cryptanalysis of McEliece variants with compact keys", in Advances in Cryptology - EUROCRYPT 2010, ser. Lecture Notes in Computer Science, H. Gilbert, Ed. Springer Berlin/Heidelberg, 2010, vol. 6110, pp. 279-298.
    • (2010) Advances in Cryptology - EUROCRYPT 2010 , vol.6110 , pp. 279-298
    • Faugère, J.-C.1    Otmani, A.2    Perret, L.3    Tillich, J.-P.4
  • 20
    • 72449174805 scopus 로고    scopus 로고
    • Security bounds for the design of codebased cryptosystems
    • ser. Lecture Notes in Computer Science, M. Matsui, Ed. Springer Berlin/Heidelberg
    • M. Finiasz and N. Sendrier, "Security bounds for the design of codebased cryptosystems", in Advances in Cryptology - ASIACRYPT 2009, ser. Lecture Notes in Computer Science, M. Matsui, Ed. Springer Berlin/Heidelberg, 2009, vol. 5912, pp. 88-105.
    • (2009) Advances in Cryptology - ASIACRYPT 2009 , vol.5912 , pp. 88-105
    • Finiasz, M.1    Sendrier, N.2
  • 21
    • 0033183669 scopus 로고    scopus 로고
    • Improved decoding of Reed-Solomon and algebraic-geometry codes
    • V. Guruswami and M. Sudan, "Improved decoding of Reed-Solomon and algebraic-geometry codes", Information Theory, IEEE transactions on, vol. 45, no. 6, pp. 1757-1767, 1999.
    • (1999) Information Theory, IEEE Transactions on , vol.45 , Issue.6 , pp. 1757-1767
    • Guruswami, V.1    Sudan, M.2
  • 22
    • 0028294826 scopus 로고
    • On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
    • Jan
    • Y. X. Li, R. Deng, and X. M. Wang, "On the equivalence of McEliece's and Niederreiter's public-key cryptosystems", Information Theory, IEEE Transactions on, vol. 40, no. 1, pp. 271-273, Jan. 1994.
    • (1994) Information Theory, IEEE Transactions on , vol.40 , Issue.1 , pp. 271-273
    • Li, Y.X.1    Deng, R.2    Wang, X.M.3
  • 24
    • 0002448405 scopus 로고
    • A public-key cryptosystem based on algebraic coding theory
    • R. McEliece, "A public-key cryptosystem based on algebraic coding theory", Deep Space Network Progress Report, vol. 44, pp. 114-116, 1978.
    • (1978) Deep Space Network Progress Report , vol.44 , pp. 114-116
    • McEliece, R.1
  • 25
    • 70549109066 scopus 로고    scopus 로고
    • Compact McEliece keys from Goppa codes
    • ser. Lecture Notes in Computer Science, Springer, updated version
    • R. Misoczki and P. S. L. M. Barreto, "Compact McEliece keys from Goppa codes", in Selected Areas in Cryptography - SAC 2009, ser. Lecture Notes in Computer Science, vol. 5867. Springer, 2009, pp. 276-392, updated version: http://eprint.iacr.org/2009/187.
    • (2009) Selected Areas in Cryptography - SAC 2009 , vol.5867 , pp. 276-392
    • Misoczki, R.1    Barreto, P.S.L.M.2
  • 26
    • 0022582790 scopus 로고
    • Knapsack-type cryptosystems and algebraic coding theory
    • 159-166
    • H. Niederreiter, "Knapsack-type cryptosystems and algebraic coding theory", Problems of Control and Information Theory, pp. 15(2):159-166, 1986.
    • (1986) Problems of Control and Information Theory , Issue.2 , pp. 15
    • Niederreiter, H.1
  • 28
    • 77952289695 scopus 로고    scopus 로고
    • Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes
    • A. Otmani, J.-P. Tillich, and L. Dallot, "Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes", Mathematics in Computer Science, vol. 3, pp. 129-140, 2010.
    • (2010) Mathematics in Computer Science , vol.3 , pp. 129-140
    • Otmani, A.1    Tillich, J.-P.2    Dallot, L.3
  • 29
    • 77954400700 scopus 로고    scopus 로고
    • Code-based cryptography
    • D. Bernstein, J. Buchmann, and E. Dahmen, Eds. Springer Berlin/Heidelberg
    • R. Overbeck and N. Sendrier, "Code-based cryptography", in Post-Quantum Cryptography, D. Bernstein, J. Buchmann, and E. Dahmen, Eds. Springer Berlin/Heidelberg, 2009, pp. 95-145.
    • (2009) Post-Quantum Cryptography , pp. 95-145
    • Overbeck, R.1    Sendrier, N.2
  • 30
    • 0016487667 scopus 로고
    • The algebraic decoding of Goppa codes
    • Mar
    • N. Patterson, "The algebraic decoding of Goppa codes", Information Theory, IEEE Transactions on, vol. 21, no. 2, pp. 203-207, Mar. 1975.
    • (1975) Information Theory, IEEE Transactions on , vol.21 , Issue.2 , pp. 203-207
    • Patterson, N.1
  • 31
    • 84957795480 scopus 로고    scopus 로고
    • Chosen-ciphertext security for any one-way cryptosystem
    • ser. Lecture Notes in Computer Science, H. Imai and Y. Zheng, Eds. Springer Berlin/Heidelberg
    • D. Pointcheval, "Chosen-ciphertext security for any one-way cryptosystem", in Public Key Cryptography, ser. Lecture Notes in Computer Science, H. Imai and Y. Zheng, Eds. Springer Berlin/Heidelberg, 2000, vol. 1751, pp. 129-146.
    • (2000) Public Key Cryptography , vol.1751 , pp. 129-146
    • Pointcheval, D.1
  • 32
    • 84964937021 scopus 로고
    • A method for finding codewords of small weight
    • ser. Lecture Notes in Computer Science, G. Cohen and J. Wolfmann, Eds. Springer Berlin/Heidelberg
    • J. Stern, "A method for finding codewords of small weight", in Coding Theory and Applications, ser. Lecture Notes in Computer Science, G. Cohen and J. Wolfmann, Eds. Springer Berlin/Heidelberg, 1989, vol. 388, pp. 106-113.
    • (1989) Coding Theory and Applications , vol.388 , pp. 106-113
    • Stern, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.