메뉴 건너뛰기




Volumn 7071 LNCS, Issue , 2011, Pages 244-254

Wild McEliece incognito

Author keywords

Goppa codes; list decoding; McEliece cryptosystem; Niederreiter cryptosystem; wild Goppa codes

Indexed keywords

CODE-BASED CRYPTOGRAPHY; CRYPTOGRAPHIC COMMUNITY; FINITE FIELDS; GOPPA CODES; KEY SIZES; LIST DECODING; MCELIECE; MCELIECE CRYPTOSYSTEM; NIEDERREITER CRYPTOSYSTEM; PUBLIC KEYS; SQUARE-ROOT;

EID: 82955186254     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-25405-5_16     Document Type: Conference Paper
Times cited : (26)

References (27)
  • 2
    • 14844342361 scopus 로고    scopus 로고
    • How to mask the structure of codes for a cryptographic use
    • MR 2006d:94038, Citations in this document: §1, §3, §3
    • Berger, T.P., Loidreau, P.: How to mask the structure of codes for a cryptographic use. Designs, Codes and Cryptography 35, 63-79 (2005), MR 2006d:94038, http://www.springerlink.com/index/JR001118R1567U13.pdf; Citations in this document: §1, §3, §3
    • (2005) Designs, Codes and Cryptography , vol.35 , pp. 63-79
    • Berger, T.P.1    Loidreau, P.2
  • 3
    • 0004216907 scopus 로고
    • Aegean Park Press ISBN 0894120638; Citations in this document: §2
    • Berlekamp, E.R.: Algebraic coding theory. Aegean Park Press (1984) ISBN 0894120638; Citations in this document: §2
    • (1984) Algebraic Coding Theory
    • Berlekamp, E.R.1
  • 4
    • 79959294715 scopus 로고    scopus 로고
    • List decoding for binary Goppa codes
    • 10, Citations in this document: §2
    • Bernstein, D.J.: List decoding for binary Goppa codes. In: IWCC [10], pp. 62-80 (2011), http://cr.yp.to/papers.html#goppalist; Citations in this document: §2
    • (2011) IWCC , pp. 62-80
    • Bernstein, D.J.1
  • 5
    • 82955186258 scopus 로고    scopus 로고
    • Simplified high-speed high-distance list decoding for alternant codes
    • 27, Citations in this document: §2, §2
    • Bernstein, D.J.: Simplified high-speed high-distance list decoding for alternant codes. In: PQCrypto[27], pp. 200-216 (2011), http://cr.yp.to/papers. html#simplelist; Citations in this document: §2, §2
    • (2011) PQCrypto , pp. 200-216
    • Bernstein, D.J.1
  • 6
    • 79952615449 scopus 로고    scopus 로고
    • Wild McEliece
    • 7, Citations in this document: §1, §1, §1, §1, §1, §1, §2, §2, §2, §3, §4, §4
    • Bernstein, D.J., Lange, T., Peters, C.: Wild McEliece. In: SAC 2010 [7], pp. 143-158 (2011), http://eprint.iacr.org/2010/410; Citations in this document: §1, §1, §1, §1, §1, §1, §2, §2, §2, §3, §4, §4
    • (2011) SAC 2010 , pp. 143-158
    • Bernstein, D.J.1    Lange, T.2    Peters, C.3
  • 7
    • 82955183861 scopus 로고    scopus 로고
    • Selected areas in cryptography - 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010
    • revised selected papers. Springer, Heidelberg See [6]
    • Biryukov, A., Gong, G., Stinson, D.R. (eds.): Selected areas in cryptography - 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, revised selected papers. Lecture Notes in Computer Science, vol. 6544. Springer, Heidelberg (2011); See [6]
    • (2011) Lecture Notes in Computer Science , vol.6544
    • Biryukov, A.1    Gong, G.2    Stinson, D.R.3
  • 8
    • 77953492781 scopus 로고    scopus 로고
    • Citations in this document: §4, §4
    • Certicom: Certicom ECC Challenge (1997), http://www.certicom.com/images/ pdfs/cert-ecc-challenge.pdf; Citations in this document: §4, §4
    • (1997) Certicom ECC Challenge
  • 9
    • 80051954141 scopus 로고
    • Abbaye de la Bussière sur Ouche, France October See [20]
    • Charpin, P. (ed.): Livre des résumés - EUROCODE 94, Abbaye de la Bussière sur Ouche, France (October 1994); See [20]
    • (1994) Livre des Résumés - EUROCODE 94
    • Charpin, P.1
  • 10
    • 82955212235 scopus 로고    scopus 로고
    • Coding and cryptology - Third international workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011, proceedings
    • Springer, Heidelberg See 4
    • Chee, Y.M., Guo, Z., Ling, S., Shao, F., Tang, Y., Wang, H., Xing, C. (eds.): Coding and cryptology - third international workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011, proceedings. Lecture Notes in Computer Science, vol. 6639. Springer, Heidelberg (2011); See [4]
    • (2011) Lecture Notes in Computer Science , vol.6639
    • Chee, Y.M.1    Guo, Z.2    Ling, S.3    Shao, F.4    Tang, Y.5    Wang, H.6    Xing, C.7
  • 11
    • 0347487953 scopus 로고
    • A new class of linear error correcting codes
    • Citations in this document: §2, §2
    • Goppa, V.D.: A new class of linear error correcting codes. Problemy Peredachi Informatsii 6, 24-30 (1970); Citations in this document: §2, §2
    • (1970) Problemy Peredachi Informatsii , vol.6 , pp. 24-30
    • Goppa, V.D.1
  • 12
    • 1842755037 scopus 로고
    • Rational representation of codes and (L; g)-codes
    • Citations in this document: §2
    • Goppa, V.D.: Rational representation of codes and (L; g)-codes. Problemy Peredachi Informatsii 7, 41-49 (1971); Citations in this document: §2
    • (1971) Problemy Peredachi Informatsii , vol.7 , pp. 41-49
    • Goppa, V.D.1
  • 13
    • 79952590161 scopus 로고    scopus 로고
    • Public key cryptography: Proceedings of the 4th international workshop on practice and theory in public key cryptosystems (PKC 2001) held on Cheju Island, February 13-15, 2001
    • Springer, Heidelberg See [14]
    • Kim, K. (ed.): Public key cryptography: proceedings of the 4th international workshop on practice and theory in public key cryptosystems (PKC 2001) held on Cheju Island, February 13-15, 2001. Lecture Notes in Computer Science, vol. 1992. Springer, Heidelberg (2001); See [14]
    • (2001) Lecture Notes in Computer Science , vol.1992
    • Kim, K.1
  • 14
    • 84937393537 scopus 로고    scopus 로고
    • Semantically secure McEliece public-key cryptosystems - Conversions for McEliece PKC
    • 13, MR 2003c:94027; Citations in this document: §4
    • Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems - conversions for McEliece PKC. In: PKC 2001 [13], pp. 19-35 (2001), MR 2003c:94027; Citations in this document: §4
    • (2001) PKC 2001 , pp. 19-35
    • Kobara, K.1    Imai, H.2
  • 15
    • 0002448405 scopus 로고
    • A public-key cryptosystem based on algebraic coding theory
    • Citations in this document: §1
    • McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. JPL DSN Progress Report, 114-116 (1978), http://ipnpr.jpl.nasa.gov/ progress-report2/42-44/44N.PDF; Citations in this document: §1
    • (1978) JPL DSN Progress Report , pp. 114-116
    • McEliece, R.J.1
  • 16
    • 0022582790 scopus 로고
    • Knapsack-type cryptosystems and algebraic coding theory
    • Citations in this document: §1, §4
    • Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory 15, 159-166 (1986); Citations in this document: §1, §4
    • (1986) Problems of Control and Information Theory , vol.15 , pp. 159-166
    • Niederreiter, H.1
  • 17
    • 0016487667 scopus 로고
    • The algebraic decoding of Goppa codes
    • Citations in this document: §2
    • Patterson, N.J.: The algebraic decoding of Goppa codes. IEEE Transactions on Information Theory 21, 203-207 (1975); Citations in this document: §2
    • (1975) IEEE Transactions on Information Theory , vol.21 , pp. 203-207
    • Patterson, N.J.1
  • 18
    • 77954391096 scopus 로고    scopus 로고
    • q
    • 22, Citations in this document: §1, §3, §4, §4, §4, §5
    • q. In: PQCrypto 2010 [22], pp. 81-94 (2010), http://eprint.iacr.org/2009/589; Citations in this document: §1, §3, §4, §4, §4, §5
    • (2010) PQCrypto 2010 , pp. 81-94
    • Peters, C.1
  • 19
    • 82955212237 scopus 로고
    • Citations in this document: §4
    • RSA Laboratories: The RSA Factoring Challenge (1991), http://www.rsa.com/rsalabs/node.asp?id=2092; Citations in this document: §4
    • (1991) The RSA Factoring Challenge
  • 20
    • 38049154914 scopus 로고
    • On the structure of a randomly permuted concatenated code
    • 9 Citations in this document: §3, §3
    • Sendrier, N.: On the structure of a randomly permuted concatenated code. In: EUROCODE 94 [9], pp. 169-173 (1994); Citations in this document: §3, §3
    • (1994) EUROCODE 94 , pp. 169-173
    • Sendrier, N.1
  • 21
    • 0034226112 scopus 로고    scopus 로고
    • Finding the permutation between equivalent linear codes: The sup- port splitting algorithm
    • MR 2001e:94017, Citations in this document: §1
    • Sendrier, N.: Finding the permutation between equivalent linear codes: the sup- port splitting algorithm. IEEE Transactions on Information Theory 46, 1193-1203 (2000), MR 2001e:94017, http://hal.inria.fr/docs/00/07/30/37/PDF/RR- 3637.pdf; Citations in this document: §1
    • (2000) IEEE Transactions on Information Theory , vol.46 , pp. 1193-1203
    • Sendrier, N.1
  • 22
    • 79952607490 scopus 로고    scopus 로고
    • Post-quantum cryptography, third international workshop, PQCrypto, Darmstadt, Germany, May 25-28, 2010
    • Springer, Heidelberg See [18], [25]
    • Sendrier, N. (ed.): Post-quantum cryptography, third international workshop, PQCrypto, Darmstadt, Germany, May 25-28, 2010. Lecture Notes in Computer Science, vol. 6061. Springer, Heidelberg (2010); See [18], [25]
    • (2010) Lecture Notes in Computer Science , vol.6061
    • Sendrier, N.1
  • 23
    • 64249164652 scopus 로고    scopus 로고
    • Version 4.4.3. Citations in this document: §4
    • Stein, W. (ed.): Sage Mathematics Software (Version 4.4.3). The Sage Group (2010), http://www.sagemath.org; Citations in this document: §4
    • (2010) Sage Mathematics Software
    • Stein, W.1
  • 24
    • 0016996242 scopus 로고
    • Further results on Goppa codes and their applications to constructing efficient binary codes
    • Citations in this document: §2
    • Sugiyama, Y., Kasahara, M., Hirasawa, S., Namekawa, T.: Further results on Goppa codes and their applications to constructing efficient binary codes. IEEE Transactions on Information Theory 22, 518-526 (1976); Citations in this document: §2
    • (1976) IEEE Transactions on Information Theory , vol.22 , pp. 518-526
    • Sugiyama, Y.1    Kasahara, M.2    Hirasawa, S.3    Namekawa, T.4
  • 25
    • 77954408355 scopus 로고    scopus 로고
    • Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes
    • 22, Citations in this document: §3
    • Wieschebrink, C.: Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes. In: PQCrypto 2010 [22], pp. 61-72 (2010); Citations in this document: §3
    • (2010) PQCrypto 2010 , pp. 61-72
    • Wieschebrink, C.1
  • 26
    • 82955212232 scopus 로고    scopus 로고
    • accessed 01 July 2011 Citations in this document: §4
    • Wikipedia: RSA Factoring Challenge - Wikipedia, The Free Encyclopedia. accessed 01 July 2011 (2011), http://en.wikipedia.org/wiki/RSA-Factoring- Challenge; Citations in this document: §4
    • (2011) RSA Factoring Challenge - Wikipedia, The Free Encyclopedia
  • 27
    • 82955176333 scopus 로고    scopus 로고
    • Post-quantum cryptography, Fourth international workshop, PQCrypto, Taipei, Taiwan, November 29-December 02, 2011
    • Springer, Heidelberg See 5
    • Yang, B.-Y. (ed.): Post-quantum cryptography, Fourth international workshop, PQCrypto, Taipei, Taiwan, November 29-December 02, 2011. Lecture Notes in Computer Science, vol. 7071. Springer, Heidelberg (2011); See [5]
    • (2011) Lecture Notes in Computer Science , vol.7071
    • Yang, B.-Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.