메뉴 건너뛰기




Volumn 1, Issue 2, 2007, Pages 151-199

A summary of McEliece-type cryptosystems and their security

Author keywords

Code based cryptography; Goppa codes; McEliece cryptosystem; Public key cryptography

Indexed keywords


EID: 84858691417     PISSN: 18622976     EISSN: 18622984     Source Type: Journal    
DOI: 10.1515/JMC.2007.009     Document Type: Article
Times cited : (45)

References (52)
  • 1
    • 84946834623 scopus 로고    scopus 로고
    • A statistical decoding algorithm for general linear block codes
    • Springer
    • A. Kh. Al Jabri, A Statistical Decoding Algorithm for General Linear Block Codes. Cryptography and Coding 2001, LNCS 2260, pp. 1-8. Springer, 2001.
    • (2001) Cryptography and Coding 2001, LNCS , vol.2260 , pp. 1-8
    • Kh. Al Jabri, A.1
  • 2
    • 0026850580 scopus 로고
    • Security of Xinmei digital signature scheme
    • M. Alabbadi and S. B. Wicker, Security of Xinmei digital signature scheme, Electronics Letters 29 (1992), pp. 890-891.
    • (1992) Electronics Letters , vol.29 , pp. 890-891
    • Alabbadi, M.1    Wicker, S.B.2
  • 3
    • 84858659532 scopus 로고
    • A digital signature scheme based on linear error-correcting block codes
    • Springer
    • -, A digital signature scheme based on linear error-correcting block codes. ASI- ACRYPT '94, LNCS 917, pp. 238-248. Springer, 1995.
    • (1995) ASI- ACRYPT '94, LNCS , vol.917 , pp. 238-248
    • Alabbadi, M.1    Wicker, S.B.2
  • 4
    • 33646171290 scopus 로고    scopus 로고
    • A Family of Fast Syndrome Based Cryptographic Hash Functions
    • D. Augot, M. Finiasz, and N. Sendrier, A Family of Fast Syndrome Based Cryptographic Hash Functions. Proc. of Mycrypt 2005, LNCS 3715, pp. 64-83, 2005.
    • (2005) Proc. of Mycrypt 2005, LNCS , vol.3715 , pp. 64-83
    • Augot, D.1    Finiasz, M.2    Sendrier, N.3
  • 6
    • 84958666890 scopus 로고    scopus 로고
    • Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack
    • Advances in Cryptology - CRYPTO '97
    • T. Berson, Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack. Proceedings of CRYPTO, Lecture Notes in Computer Science 1294, pp. 213-220. Springer, 1997. (Pubitemid 127112554)
    • (1997) Lecture Notes in Computer Science , Issue.1294 , pp. 213-220
    • Berson, T.A.1
  • 7
    • 0024012468 scopus 로고
    • Cryptanalysis: A Survey of Recent Results
    • E. F. Brickell and A. M. Odlyzko, Cryptanalysis: A Survey of Recent Results. Proc. of the IEEE, 76, pp. 578-593, 1988.
    • (1988) Proc. of the IEEE , vol.76 , pp. 578-593
    • Brickell, E.F.1    Odlyzko, A.M.2
  • 9
    • 0031675932 scopus 로고    scopus 로고
    • A new algorithm for finding minimum-weight words in a linear code: application to mceliece's cryptosystem and to narrow-sense bch codes of length 511
    • PII S0018944898000182
    • A. Canteaut and F. Chabaut, A new algorithm for finding minimum-weight words in a linear code: application to primitive narrow-sense BCH-codes of length 511, IEEE Transactions on Information Theory 44 (1998), pp. 367-378. (Pubitemid 128737912)
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.1 , pp. 367-378
    • Canteaut, A.1    Chabaud, F.2
  • 10
    • 84947809062 scopus 로고    scopus 로고
    • Cryptanalysis of the Original McEliece Cryptosystem
    • Advances in Cryptology - ASIACRYPT '98
    • A. Canteaut and N. Sendrier, Cryptanalysis of the Original McEliece Cryptosystem. Advances in Cryptology - ASIACRYPT '98 Proceedings, pp. 187-199. Springer, 1998. (Pubitemid 128151411)
    • (1998) Lecture Notes in Computer Science , Issue.1514 , pp. 187-199
    • Canteaut, A.1    Sendrier, N.2
  • 11
    • 84948963042 scopus 로고
    • On the security of some cryptosystems based on error-correcting codes
    • F. Chabaud, On the security of some cryptosystems based on error-correcting codes, Lecture Notes in Computer Science 950 (1995), pp. 131-139.
    • (1995) Lecture Notes in Computer Science , vol.950 , pp. 131-139
    • Chabaud, F.1
  • 12
    • 84929461941 scopus 로고    scopus 로고
    • How to achieve a McEliece-based digital signature scheme
    • Springer
    • N. Courtois, M. Finiasz, and N. Sendrier, How to achieve a McEliece-based Digital Signature Scheme. Advances in Cryptology - ASIACRYPT 2001, 2248, pp. 157-174. Springer, 2001.
    • (2001) Advances in Cryptology - ASIACRYPT , vol.2248 , Issue.2001 , pp. 157-174
    • Courtois, N.1    Finiasz, M.2    Sendrier, N.3
  • 14
    • 84947905764 scopus 로고    scopus 로고
    • An efficient pseudo-random generator provably as secure as syndrome decoding
    • J.-B. Fischer and J. Stern, An eficient pseudo-random generator provably as secure as syndrome decoding. Advances in Cryptology - EUROCRYPT '96 (Ueli M. Maurer, ed.), LNCS 1070, pp. 245-255. Springer, 1996. (Pubitemid 126071070)
    • (1996) Lecture Notes in Computer Science , Issue.1070 , pp. 245-255
    • Fischer, J.1    Stern, J.2
  • 15
    • 84858688882 scopus 로고    scopus 로고
    • Modeling bit flipping decoding based on non orthogonal check sums and application to iterative decoding attack of McEliece crypto-system
    • Parma, Italy (ISITA'04), October 2004
    • M. Fossorier, H. Imai, and K. Kobara, Modeling Bit Flipping Decoding Based on Non Orthogonal Check Sums and Application to Iterative Decoding Attack of McEliece Crypto-System. Proc. of 2004 International Symposium on Information Theory and its Applications, Parma, Italy (ISITA'04), October 2004.
    • Proc. of 2004 International Symposium on Information Theory and Its Applications
    • Fossorier, M.1    Imai, H.2    Kobara, K.3
  • 16
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Springer
    • E. Fujisaki and T. Okamoto, Secure Integration of Asymmetric and Symmetric Encryption Schemes. Proc. of CRYPTO, LNCS 547, pp. 535-554. Springer, 1999.
    • (1999) Proc. of CRYPTO, LNCS , vol.547 , pp. 535-554
    • Fujisaki, E.1    Okamoto, T.2
  • 18
    • 84935622001 scopus 로고
    • Ideals over a non-commutative ring and their applications to cryptography
    • Springer
    • E. M. Gabidulin, A. V. Paramonov, and O. V. Tretjakov, Ideals over a Non-Commutative Ring and their Applications to Cryptography. Proc. Eurocrypt '91, LNCS 547. Springer, 1991.
    • (1991) Proc. Eurocrypt '91, LNCS , vol.547
    • Gabidulin, E.M.1    Paramonov, A.V.2    Tretjakov, O.V.3
  • 19
    • 51649128710 scopus 로고    scopus 로고
    • Shorter keys for code based cryptography
    • P. Gaborit, Shorter keys for code based cryptography. Proc. of WCC 2005, pp. 81-90, 2005.
    • (2005) Proc. of WCC , vol.2005 , pp. 81-90
    • Gaborit, P.1
  • 20
    • 0003068986 scopus 로고    scopus 로고
    • Tests and constructions of irreducible polynomials over finite fields
    • S. Gao and D. Panario, Tests and constructions of irreducible polynomials over finite fields, Foundations of Computational Mathematics (1997), pp. 346-361.
    • (1997) Foundations of Computational Mathematics , pp. 346-361
    • Gao, S.1    Panario, D.2
  • 21
    • 25444433745 scopus 로고
    • Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem. Advances in cryptology - Eurocrypt'91
    • D. W. Davies, ed. Springer
    • K. Gibson, Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem. Advances in Cryptology - Eurocrypt'91 (D. W. Davies, ed.), LNCS 547, pp. 517-521. Springer, 1991.
    • (1991) LNCS , vol.547 , pp. 517-521
    • Gibson, K.1
  • 23
    • 0026765268 scopus 로고
    • Cryptanalysis and modification of digital signature scheme based on error-correcting codes
    • L. Harn and D.-C. Wang, Cryptanalysis and modification of digital signature scheme based on error-correcting codes, Electronics Letters 28 (1992), pp. 157-159.
    • (1992) Electronics Letters , vol.28 , pp. 157-159
    • Harn, L.1    Wang, D.-C.2
  • 26
    • 0346871653 scopus 로고    scopus 로고
    • McEliece public key cryptosystems using algebraic-geometric codes
    • H. Janwa and O. Moreno, McEliece Public Key Cryptosystems Using Algebraic-Geometric Codes, Designes, Codes and Cryptography 8 (1996), pp. 293-307. (Pubitemid 126708388)
    • (1996) Designs, Codes, and Cryptography , vol.8 , Issue.3 , pp. 293-307
    • Janwa, H.1    Moreno, O.2
  • 28
    • 0347968064 scopus 로고    scopus 로고
    • On the One-Wayness Against Chosen-Plaintext Attacks of the Loidreau's modified McEliece PKC
    • -, On the One-Wayness Against Chosen-Plaintext Attacks of the Loidreau's modified McEliece PKC. IEEE Transactions on Information Theory 49 (2003), 3160-3168.
    • (2003) IEEE Transactions on Information Theory , vol.49 , pp. 3160-3168
    • Kobara, K.1    Imai, H.2
  • 29
    • 0021936756 scopus 로고
    • Solving low-density subset sum problems
    • DOI 10.1145/2455.2461
    • J. C. Lagarias and A. M. Odlyzko, Solving Low-Density Subset Sum Problems, J. ACM 32 (1985), pp. 229-246. (Pubitemid 15599042)
    • (1985) Journal of the ACM , vol.32 , Issue.1 , pp. 229-246
    • Lagarias, J.C.1    Odlyzko, A.M.2
  • 30
    • 85034651324 scopus 로고
    • Brickell, An observation on the security of McEliece's public key cryptosystem
    • Springer
    • P. J. Lee and E. F. Brickell, An observation on the security of McEliece's public key cryptosystem. Advances in Cryptology-EUROCRYPT'88, LNCS 330, pp. 275-280. Springer, 1989, http://dsns.csie.nctu.edu.tw/research/crypto/ HTML/PDF/E88/275.PDF.
    • (1989) Advances in Cryptology-EUROCRYPT'88, LNCS , vol.330 , pp. 275-280
    • Lee, P.J.E.F.1
  • 31
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • DOI 10.1007/s00145-001-0009-4
    • A. K. Lenstra and E. R. Verheul, Selecting Cryptographic Key Sizes, Journal of Cryptology: the journal of the International Association for Cryptologic Research 14 (2001), pp. 255-293. (Pubitemid 33770276)
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2
  • 32
    • 0024078914 scopus 로고
    • A probabilistic algorithm for computing minimum weights of large error-correcting codes
    • J. S. Leon, A probabilistic algorithm for computing minimum weights of large error-correcting codes, IEEE Transactions on Information Theory 34 (1988), pp. 1354-1359.
    • (1988) IEEE Transactions on Information Theory , vol.34 , pp. 1354-1359
    • Leon, J.S.1
  • 33
    • 0028294826 scopus 로고
    • The Equivalence of McEliece's and Niederreiter's Public-Key Cryptosystems
    • Y. X. Li, R. H. Deng, and X. M. Wang, the Equivalence of McEliece's and Niederreiter's Public-Key Cryptosystems, IEEE Transactions on Information Theory 40 (1994), pp. 271-273.
    • (1994) IEEE Transactions on Information Theory , vol.40 , pp. 271-273
    • Li, Y.X.1    Deng, R.H.2    Wang, X.M.3
  • 35
    • 0035270825 scopus 로고    scopus 로고
    • Weak keys in the McEliece public-key cryptosystem
    • DOI 10.1109/18.915687, PII S0018944801015176
    • P. Loidreau and N. Sendrier, Weak keys in the McEliece public-key cryptosystem, IEEE Transactions on Information Theory 47 (2001), pp. 1207-1211. (Pubitemid 32425453)
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.3 , pp. 1207-1211
    • Loidreau, P.1    Sendrier, N.2
  • 37
    • 0002448405 scopus 로고
    • A public key cryptosystem based on algebraic coding theory
    • R. J. McEliece, A public key cryptosystem based on algebraic coding theory, DSN progress report 42-44 (1978), pp. 114-116.
    • (1978) DSN Progress Report , vol.42-44 , pp. 114-116
    • McEliece, R.J.1
  • 39
    • 33646185189 scopus 로고    scopus 로고
    • A new structural attack for GPT and variants
    • Springer
    • R. Overbeck, A new structural attack for GPT and variants. Proc. of Mycrypt 2005, LNCS 3715, pp. 50-63. Springer, 2005.
    • (2005) Proc. of Mycrypt 2005, LNCS , vol.3715 , pp. 50-63
    • Overbeck, R.1
  • 41
    • 0016487667 scopus 로고
    • Algebraic Decoding of Goppa Codes
    • N. Patterson, Algebraic Decoding of Goppa Codes, IEEE Trans. Info. Theory 21 (1975), pp. 203-207.
    • (1975) IEEE Trans. Info. Theory , vol.21 , pp. 203-207
    • Patterson, N.1
  • 42
    • 84957795480 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security for any One-Way Cryptosystem
    • Springer
    • D. Pointcheval, Chosen-Ciphertext Security for any One-Way Cryptosystem. Proc. of PKC, LNCS 1751, pp. 129-146. Springer, 2000.
    • (2000) Proc. of PKC, LNCS , vol.1751 , pp. 129-146
    • Pointcheval, D.1
  • 43
    • 3242867844 scopus 로고    scopus 로고
    • Cryptanalysis of Krouk's public-key cipher
    • V. C. Jr. Rocha, V. C. JR Da Rocha, and D. L. Macedo, Cryptanalysis of Krouk's public-key cipher, Electronics Letters 32 (1996), 1279-1280. (Pubitemid 126511297)
    • (1996) Electronics Letters , vol.32 , Issue.14 , pp. 1279-1280
    • Da Rocha Jr., V.C.1    Lopes De Macedo, D.2
  • 44
    • 0003941547 scopus 로고    scopus 로고
    • On the dimension of the hull
    • PII S0895480195294027
    • N. Sendrier, On the dimension of the hull, SIAM Journal on Discrete Mathematics 10 (1997), pp. 282-293. (Pubitemid 127577165)
    • (1997) SIAM Journal on Discrete Mathematics , vol.10 , Issue.2 , pp. 282-293
    • Sendrier, N.1
  • 45
    • 0034226112 scopus 로고    scopus 로고
    • Finding the permutation between equivalent linear codes: The support splitting algorithm
    • -, Finding the permutation between equivalent linear codes: the support splitting algorithm, IEEE Transactions on Information Theory 46 (2000), 1193-1203.
    • (2000) IEEE Transactions on Information Theory , vol.46 , pp. 1193-1203
    • Sendrier, N.1
  • 46
    • 33646166930 scopus 로고    scopus 로고
    • On the security of the McEliece public-key cryptosystem
    • M. Blaum, P. G. Farrell, and H. van Tilborg, eds. Kluwer
    • -, On the security of the McEliece public-key cryptosystem. Proceedings of Workshop honoring Prof. Bob McEliece on his 60th birthday (M. Blaum, P. G. Farrell, and H. van Tilborg, eds.), pp. 141-163. Kluwer, 2002.
    • (2002) Proceedings of Workshop Honoring Prof. Bob McEliece on His 60th Birthday , pp. 141-163
    • Sendrier, N.1
  • 48
    • 84929257781 scopus 로고
    • On insecurity of cryptosystems based on generalized Reed-Solomon codes
    • V. M. Sidelnikov and S. O. Shestakov, On insecurity of cryptosystems based on generalized Reed-Solomon codes, Discrete Mathematics and Applications 2 (1992), 439-444.
    • (1992) Discrete Mathematics and Applications , vol.2 , pp. 439-444
    • Sidelnikov, V.M.1    Shestakov, S.O.2
  • 49
    • 84964937021 scopus 로고
    • A method for finding codewords of small weight
    • J. Stern, A method for finding codewords of small weight, Coding Theory and Applications 388 (1989), pp. 106-133.
    • (1989) Coding Theory and Applications , vol.388 , pp. 106-133
    • Stern, J.1
  • 50
    • 84955595109 scopus 로고
    • A new identification scheme based on syndrome decoding
    • Springer
    • -, A new identification scheme based on syndrome decoding. Advances in Cryptology - CRYPTO'93, LNCS 773. Springer, 1994.
    • (1994) Advances in Cryptology - CRYPTO'93, LNCS , vol.773
    • Stern, J.1
  • 51
    • 84858653249 scopus 로고
    • Can one design a signature scheme based on error-correcting codes
    • -, Can one design a signature scheme based on error-correcting codes. ASIACRYPT '94, LNCS 917, pp. 424-426, 1995.
    • (1995) ASIACRYPT '94, LNCS , vol.917 , pp. 424-426
    • Stern, J.1
  • 52
    • 0025448457 scopus 로고
    • Digital signature scheme based on error-correcting codes
    • W. Xinmei, Digital signature scheme based on error-correcting codes, Electronics Letters 26 (1990), pp. 898-899. (Pubitemid 20709324)
    • (1990) Electronics Letters , vol.26 , Issue.13 , pp. 898-899
    • Xinmei, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.