-
2
-
-
14844342361
-
How to mask the structure of codes for a cryptographic use
-
MR 2006d:94038, Citations in this document: §1, §3, §3
-
Berger, T.P., Loidreau, P.: How to mask the structure of codes for a cryptographic use. Designs, Codes and Cryptography 35, 63-79 (2005), MR 2006d:94038, http://www.springerlink.com/index/JR001118R1567U13.pdf; Citations in this document: §1, §3, §3
-
(2005)
Designs, Codes and Cryptography
, vol.35
, pp. 63-79
-
-
Berger, T.P.1
Loidreau, P.2
-
3
-
-
0004216907
-
-
Aegean Park Press ISBN 0894120638; Citations in this document: §2
-
Berlekamp, E.R.: Algebraic coding theory. Aegean Park Press (1984) ISBN 0894120638; Citations in this document: §2
-
(1984)
Algebraic Coding Theory
-
-
Berlekamp, E.R.1
-
4
-
-
79959294715
-
List decoding for binary Goppa codes
-
10, Citations in this document: §2
-
Bernstein, D.J.: List decoding for binary Goppa codes. In: IWCC [10], pp. 62-80 (2011), http://cr.yp.to/papers.html#goppalist; Citations in this document: §2
-
(2011)
IWCC
, pp. 62-80
-
-
Bernstein, D.J.1
-
5
-
-
82955186258
-
Simplified high-speed high-distance list decoding for alternant codes
-
27, Citations in this document: §2, §2
-
Bernstein, D.J.: Simplified high-speed high-distance list decoding for alternant codes. In: PQCrypto[27], pp. 200-216 (2011), http://cr.yp.to/papers. html#simplelist; Citations in this document: §2, §2
-
(2011)
PQCrypto
, pp. 200-216
-
-
Bernstein, D.J.1
-
6
-
-
79952615449
-
Wild McEliece
-
7, Citations in this document: §1, §1, §1, §1, §1, §1, §2, §2, §2, §3, §4, §4
-
Bernstein, D.J., Lange, T., Peters, C.: Wild McEliece. In: SAC 2010 [7], pp. 143-158 (2011), http://eprint.iacr.org/2010/410; Citations in this document: §1, §1, §1, §1, §1, §1, §2, §2, §2, §3, §4, §4
-
(2011)
SAC 2010
, pp. 143-158
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
7
-
-
82955183861
-
Selected areas in cryptography - 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010
-
revised selected papers. Springer, Heidelberg See [6]
-
Biryukov, A., Gong, G., Stinson, D.R. (eds.): Selected areas in cryptography - 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, revised selected papers. Lecture Notes in Computer Science, vol. 6544. Springer, Heidelberg (2011); See [6]
-
(2011)
Lecture Notes in Computer Science
, vol.6544
-
-
Biryukov, A.1
Gong, G.2
Stinson, D.R.3
-
8
-
-
77953492781
-
-
Citations in this document: §4, §4
-
Certicom: Certicom ECC Challenge (1997), http://www.certicom.com/images/ pdfs/cert-ecc-challenge.pdf; Citations in this document: §4, §4
-
(1997)
Certicom ECC Challenge
-
-
-
9
-
-
80051954141
-
-
Abbaye de la Bussière sur Ouche, France October See [20]
-
Charpin, P. (ed.): Livre des résumés - EUROCODE 94, Abbaye de la Bussière sur Ouche, France (October 1994); See [20]
-
(1994)
Livre des Résumés - EUROCODE 94
-
-
Charpin, P.1
-
10
-
-
82955212235
-
Coding and cryptology - Third international workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011, proceedings
-
Springer, Heidelberg See 4
-
Chee, Y.M., Guo, Z., Ling, S., Shao, F., Tang, Y., Wang, H., Xing, C. (eds.): Coding and cryptology - third international workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011, proceedings. Lecture Notes in Computer Science, vol. 6639. Springer, Heidelberg (2011); See [4]
-
(2011)
Lecture Notes in Computer Science
, vol.6639
-
-
Chee, Y.M.1
Guo, Z.2
Ling, S.3
Shao, F.4
Tang, Y.5
Wang, H.6
Xing, C.7
-
11
-
-
0347487953
-
A new class of linear error correcting codes
-
Citations in this document: §2, §2
-
Goppa, V.D.: A new class of linear error correcting codes. Problemy Peredachi Informatsii 6, 24-30 (1970); Citations in this document: §2, §2
-
(1970)
Problemy Peredachi Informatsii
, vol.6
, pp. 24-30
-
-
Goppa, V.D.1
-
12
-
-
1842755037
-
Rational representation of codes and (L; g)-codes
-
Citations in this document: §2
-
Goppa, V.D.: Rational representation of codes and (L; g)-codes. Problemy Peredachi Informatsii 7, 41-49 (1971); Citations in this document: §2
-
(1971)
Problemy Peredachi Informatsii
, vol.7
, pp. 41-49
-
-
Goppa, V.D.1
-
13
-
-
79952590161
-
Public key cryptography: Proceedings of the 4th international workshop on practice and theory in public key cryptosystems (PKC 2001) held on Cheju Island, February 13-15, 2001
-
Springer, Heidelberg See [14]
-
Kim, K. (ed.): Public key cryptography: proceedings of the 4th international workshop on practice and theory in public key cryptosystems (PKC 2001) held on Cheju Island, February 13-15, 2001. Lecture Notes in Computer Science, vol. 1992. Springer, Heidelberg (2001); See [14]
-
(2001)
Lecture Notes in Computer Science
, vol.1992
-
-
Kim, K.1
-
14
-
-
84937393537
-
Semantically secure McEliece public-key cryptosystems - Conversions for McEliece PKC
-
13, MR 2003c:94027; Citations in this document: §4
-
Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems - conversions for McEliece PKC. In: PKC 2001 [13], pp. 19-35 (2001), MR 2003c:94027; Citations in this document: §4
-
(2001)
PKC 2001
, pp. 19-35
-
-
Kobara, K.1
Imai, H.2
-
15
-
-
0002448405
-
A public-key cryptosystem based on algebraic coding theory
-
Citations in this document: §1
-
McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. JPL DSN Progress Report, 114-116 (1978), http://ipnpr.jpl.nasa.gov/ progress-report2/42-44/44N.PDF; Citations in this document: §1
-
(1978)
JPL DSN Progress Report
, pp. 114-116
-
-
McEliece, R.J.1
-
16
-
-
0022582790
-
Knapsack-type cryptosystems and algebraic coding theory
-
Citations in this document: §1, §4
-
Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory 15, 159-166 (1986); Citations in this document: §1, §4
-
(1986)
Problems of Control and Information Theory
, vol.15
, pp. 159-166
-
-
Niederreiter, H.1
-
17
-
-
0016487667
-
The algebraic decoding of Goppa codes
-
Citations in this document: §2
-
Patterson, N.J.: The algebraic decoding of Goppa codes. IEEE Transactions on Information Theory 21, 203-207 (1975); Citations in this document: §2
-
(1975)
IEEE Transactions on Information Theory
, vol.21
, pp. 203-207
-
-
Patterson, N.J.1
-
18
-
-
77954391096
-
q
-
22, Citations in this document: §1, §3, §4, §4, §4, §5
-
q. In: PQCrypto 2010 [22], pp. 81-94 (2010), http://eprint.iacr.org/2009/589; Citations in this document: §1, §3, §4, §4, §4, §5
-
(2010)
PQCrypto 2010
, pp. 81-94
-
-
Peters, C.1
-
19
-
-
82955212237
-
-
Citations in this document: §4
-
RSA Laboratories: The RSA Factoring Challenge (1991), http://www.rsa.com/rsalabs/node.asp?id=2092; Citations in this document: §4
-
(1991)
The RSA Factoring Challenge
-
-
-
20
-
-
38049154914
-
On the structure of a randomly permuted concatenated code
-
9 Citations in this document: §3, §3
-
Sendrier, N.: On the structure of a randomly permuted concatenated code. In: EUROCODE 94 [9], pp. 169-173 (1994); Citations in this document: §3, §3
-
(1994)
EUROCODE 94
, pp. 169-173
-
-
Sendrier, N.1
-
21
-
-
0034226112
-
Finding the permutation between equivalent linear codes: The sup- port splitting algorithm
-
MR 2001e:94017, Citations in this document: §1
-
Sendrier, N.: Finding the permutation between equivalent linear codes: the sup- port splitting algorithm. IEEE Transactions on Information Theory 46, 1193-1203 (2000), MR 2001e:94017, http://hal.inria.fr/docs/00/07/30/37/PDF/RR- 3637.pdf; Citations in this document: §1
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, pp. 1193-1203
-
-
Sendrier, N.1
-
22
-
-
79952607490
-
Post-quantum cryptography, third international workshop, PQCrypto, Darmstadt, Germany, May 25-28, 2010
-
Springer, Heidelberg See [18], [25]
-
Sendrier, N. (ed.): Post-quantum cryptography, third international workshop, PQCrypto, Darmstadt, Germany, May 25-28, 2010. Lecture Notes in Computer Science, vol. 6061. Springer, Heidelberg (2010); See [18], [25]
-
(2010)
Lecture Notes in Computer Science
, vol.6061
-
-
Sendrier, N.1
-
23
-
-
64249164652
-
-
Version 4.4.3. Citations in this document: §4
-
Stein, W. (ed.): Sage Mathematics Software (Version 4.4.3). The Sage Group (2010), http://www.sagemath.org; Citations in this document: §4
-
(2010)
Sage Mathematics Software
-
-
Stein, W.1
-
24
-
-
0016996242
-
Further results on Goppa codes and their applications to constructing efficient binary codes
-
Citations in this document: §2
-
Sugiyama, Y., Kasahara, M., Hirasawa, S., Namekawa, T.: Further results on Goppa codes and their applications to constructing efficient binary codes. IEEE Transactions on Information Theory 22, 518-526 (1976); Citations in this document: §2
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, pp. 518-526
-
-
Sugiyama, Y.1
Kasahara, M.2
Hirasawa, S.3
Namekawa, T.4
-
25
-
-
77954408355
-
Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes
-
22, Citations in this document: §3
-
Wieschebrink, C.: Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes. In: PQCrypto 2010 [22], pp. 61-72 (2010); Citations in this document: §3
-
(2010)
PQCrypto 2010
, pp. 61-72
-
-
Wieschebrink, C.1
-
26
-
-
82955212232
-
-
accessed 01 July 2011 Citations in this document: §4
-
Wikipedia: RSA Factoring Challenge - Wikipedia, The Free Encyclopedia. accessed 01 July 2011 (2011), http://en.wikipedia.org/wiki/RSA-Factoring- Challenge; Citations in this document: §4
-
(2011)
RSA Factoring Challenge - Wikipedia, The Free Encyclopedia
-
-
-
27
-
-
82955176333
-
Post-quantum cryptography, Fourth international workshop, PQCrypto, Taipei, Taiwan, November 29-December 02, 2011
-
Springer, Heidelberg See 5
-
Yang, B.-Y. (ed.): Post-quantum cryptography, Fourth international workshop, PQCrypto, Taipei, Taiwan, November 29-December 02, 2011. Lecture Notes in Computer Science, vol. 7071. Springer, Heidelberg (2011); See [5]
-
(2011)
Lecture Notes in Computer Science
, vol.7071
-
-
Yang, B.-Y.1
|