-
1
-
-
84946834623
-
A statistical decoding algorithm for general linear block codes
-
Springer
-
A. Kh. Al Jabri, A Statistical Decoding Algorithm for General Linear Block Codes. Cryptography and Coding 2001, LNCS 2260, pp. 1-8. Springer, 2001.
-
(2001)
Cryptography and Coding 2001, LNCS
, vol.2260
, pp. 1-8
-
-
Kh. Al Jabri, A.1
-
2
-
-
0026850580
-
Security of Xinmei digital signature scheme
-
M. Alabbadi and S. B. Wicker, Security of Xinmei digital signature scheme, Electronics Letters 29 (1992), pp. 890-891.
-
(1992)
Electronics Letters
, vol.29
, pp. 890-891
-
-
Alabbadi, M.1
Wicker, S.B.2
-
3
-
-
84858659532
-
A digital signature scheme based on linear error-correcting block codes
-
Springer
-
-, A digital signature scheme based on linear error-correcting block codes. ASI- ACRYPT '94, LNCS 917, pp. 238-248. Springer, 1995.
-
(1995)
ASI- ACRYPT '94, LNCS
, vol.917
, pp. 238-248
-
-
Alabbadi, M.1
Wicker, S.B.2
-
4
-
-
33646171290
-
A Family of Fast Syndrome Based Cryptographic Hash Functions
-
D. Augot, M. Finiasz, and N. Sendrier, A Family of Fast Syndrome Based Cryptographic Hash Functions. Proc. of Mycrypt 2005, LNCS 3715, pp. 64-83, 2005.
-
(2005)
Proc. of Mycrypt 2005, LNCS
, vol.3715
, pp. 64-83
-
-
Augot, D.1
Finiasz, M.2
Sendrier, N.3
-
5
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
E. Berlekamp, R. McEliece, and H. van Tilborg, On the inherent intractability of certain coding problems, IEEE Transactions on Information Theory 24 (1978), pp. 384-386. (Pubitemid 8607605)
-
(1978)
IEEE Transactions on Information Theory
, vol.IT-24
, Issue.3
, pp. 384-386
-
-
Berlekamp Elwyn, R.1
McEliece Robert, J.2
Van Tilborg Henk, C.A.3
-
6
-
-
84958666890
-
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack
-
Advances in Cryptology - CRYPTO '97
-
T. Berson, Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack. Proceedings of CRYPTO, Lecture Notes in Computer Science 1294, pp. 213-220. Springer, 1997. (Pubitemid 127112554)
-
(1997)
Lecture Notes in Computer Science
, Issue.1294
, pp. 213-220
-
-
Berson, T.A.1
-
7
-
-
0024012468
-
Cryptanalysis: A Survey of Recent Results
-
E. F. Brickell and A. M. Odlyzko, Cryptanalysis: A Survey of Recent Results. Proc. of the IEEE, 76, pp. 578-593, 1988.
-
(1988)
Proc. of the IEEE
, vol.76
, pp. 578-593
-
-
Brickell, E.F.1
Odlyzko, A.M.2
-
9
-
-
0031675932
-
A new algorithm for finding minimum-weight words in a linear code: application to mceliece's cryptosystem and to narrow-sense bch codes of length 511
-
PII S0018944898000182
-
A. Canteaut and F. Chabaut, A new algorithm for finding minimum-weight words in a linear code: application to primitive narrow-sense BCH-codes of length 511, IEEE Transactions on Information Theory 44 (1998), pp. 367-378. (Pubitemid 128737912)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.1
, pp. 367-378
-
-
Canteaut, A.1
Chabaud, F.2
-
10
-
-
84947809062
-
Cryptanalysis of the Original McEliece Cryptosystem
-
Advances in Cryptology - ASIACRYPT '98
-
A. Canteaut and N. Sendrier, Cryptanalysis of the Original McEliece Cryptosystem. Advances in Cryptology - ASIACRYPT '98 Proceedings, pp. 187-199. Springer, 1998. (Pubitemid 128151411)
-
(1998)
Lecture Notes in Computer Science
, Issue.1514
, pp. 187-199
-
-
Canteaut, A.1
Sendrier, N.2
-
11
-
-
84948963042
-
On the security of some cryptosystems based on error-correcting codes
-
F. Chabaud, On the security of some cryptosystems based on error-correcting codes, Lecture Notes in Computer Science 950 (1995), pp. 131-139.
-
(1995)
Lecture Notes in Computer Science
, vol.950
, pp. 131-139
-
-
Chabaud, F.1
-
12
-
-
84929461941
-
How to achieve a McEliece-based digital signature scheme
-
Springer
-
N. Courtois, M. Finiasz, and N. Sendrier, How to achieve a McEliece-based Digital Signature Scheme. Advances in Cryptology - ASIACRYPT 2001, 2248, pp. 157-174. Springer, 2001.
-
(2001)
Advances in Cryptology - ASIACRYPT
, vol.2248
, Issue.2001
, pp. 157-174
-
-
Courtois, N.1
Finiasz, M.2
Sendrier, N.3
-
14
-
-
84947905764
-
An efficient pseudo-random generator provably as secure as syndrome decoding
-
J.-B. Fischer and J. Stern, An eficient pseudo-random generator provably as secure as syndrome decoding. Advances in Cryptology - EUROCRYPT '96 (Ueli M. Maurer, ed.), LNCS 1070, pp. 245-255. Springer, 1996. (Pubitemid 126071070)
-
(1996)
Lecture Notes in Computer Science
, Issue.1070
, pp. 245-255
-
-
Fischer, J.1
Stern, J.2
-
15
-
-
84858688882
-
Modeling bit flipping decoding based on non orthogonal check sums and application to iterative decoding attack of McEliece crypto-system
-
Parma, Italy (ISITA'04), October 2004
-
M. Fossorier, H. Imai, and K. Kobara, Modeling Bit Flipping Decoding Based on Non Orthogonal Check Sums and Application to Iterative Decoding Attack of McEliece Crypto-System. Proc. of 2004 International Symposium on Information Theory and its Applications, Parma, Italy (ISITA'04), October 2004.
-
Proc. of 2004 International Symposium on Information Theory and Its Applications
-
-
Fossorier, M.1
Imai, H.2
Kobara, K.3
-
16
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Springer
-
E. Fujisaki and T. Okamoto, Secure Integration of Asymmetric and Symmetric Encryption Schemes. Proc. of CRYPTO, LNCS 547, pp. 535-554. Springer, 1999.
-
(1999)
Proc. of CRYPTO, LNCS
, vol.547
, pp. 535-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
17
-
-
0346076640
-
Reducible rank codes and their applications to cryptography
-
E. M. Gabidulin, A. V. Ourivski, B. Honary, and B. Ammar, Reducible rank codes and their applications to cryptography, IEEE Transactions on Information Theory 49 (2003), pp. 3289-3293.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, pp. 3289-3293
-
-
Gabidulin, E.M.1
Ourivski, A.V.2
Honary, B.3
Ammar, B.4
-
18
-
-
84935622001
-
Ideals over a non-commutative ring and their applications to cryptography
-
Springer
-
E. M. Gabidulin, A. V. Paramonov, and O. V. Tretjakov, Ideals over a Non-Commutative Ring and their Applications to Cryptography. Proc. Eurocrypt '91, LNCS 547. Springer, 1991.
-
(1991)
Proc. Eurocrypt '91, LNCS
, vol.547
-
-
Gabidulin, E.M.1
Paramonov, A.V.2
Tretjakov, O.V.3
-
19
-
-
51649128710
-
Shorter keys for code based cryptography
-
P. Gaborit, Shorter keys for code based cryptography. Proc. of WCC 2005, pp. 81-90, 2005.
-
(2005)
Proc. of WCC
, vol.2005
, pp. 81-90
-
-
Gaborit, P.1
-
20
-
-
0003068986
-
Tests and constructions of irreducible polynomials over finite fields
-
S. Gao and D. Panario, Tests and constructions of irreducible polynomials over finite fields, Foundations of Computational Mathematics (1997), pp. 346-361.
-
(1997)
Foundations of Computational Mathematics
, pp. 346-361
-
-
Gao, S.1
Panario, D.2
-
21
-
-
25444433745
-
Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem. Advances in cryptology - Eurocrypt'91
-
D. W. Davies, ed. Springer
-
K. Gibson, Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem. Advances in Cryptology - Eurocrypt'91 (D. W. Davies, ed.), LNCS 547, pp. 517-521. Springer, 1991.
-
(1991)
LNCS
, vol.547
, pp. 517-521
-
-
Gibson, K.1
-
23
-
-
0026765268
-
Cryptanalysis and modification of digital signature scheme based on error-correcting codes
-
L. Harn and D.-C. Wang, Cryptanalysis and modification of digital signature scheme based on error-correcting codes, Electronics Letters 28 (1992), pp. 157-159.
-
(1992)
Electronics Letters
, vol.28
, pp. 157-159
-
-
Harn, L.1
Wang, D.-C.2
-
26
-
-
0346871653
-
McEliece public key cryptosystems using algebraic-geometric codes
-
H. Janwa and O. Moreno, McEliece Public Key Cryptosystems Using Algebraic-Geometric Codes, Designes, Codes and Cryptography 8 (1996), pp. 293-307. (Pubitemid 126708388)
-
(1996)
Designs, Codes, and Cryptography
, vol.8
, Issue.3
, pp. 293-307
-
-
Janwa, H.1
Moreno, O.2
-
28
-
-
0347968064
-
On the One-Wayness Against Chosen-Plaintext Attacks of the Loidreau's modified McEliece PKC
-
-, On the One-Wayness Against Chosen-Plaintext Attacks of the Loidreau's modified McEliece PKC. IEEE Transactions on Information Theory 49 (2003), 3160-3168.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, pp. 3160-3168
-
-
Kobara, K.1
Imai, H.2
-
29
-
-
0021936756
-
Solving low-density subset sum problems
-
DOI 10.1145/2455.2461
-
J. C. Lagarias and A. M. Odlyzko, Solving Low-Density Subset Sum Problems, J. ACM 32 (1985), pp. 229-246. (Pubitemid 15599042)
-
(1985)
Journal of the ACM
, vol.32
, Issue.1
, pp. 229-246
-
-
Lagarias, J.C.1
Odlyzko, A.M.2
-
30
-
-
85034651324
-
Brickell, An observation on the security of McEliece's public key cryptosystem
-
Springer
-
P. J. Lee and E. F. Brickell, An observation on the security of McEliece's public key cryptosystem. Advances in Cryptology-EUROCRYPT'88, LNCS 330, pp. 275-280. Springer, 1989, http://dsns.csie.nctu.edu.tw/research/crypto/ HTML/PDF/E88/275.PDF.
-
(1989)
Advances in Cryptology-EUROCRYPT'88, LNCS
, vol.330
, pp. 275-280
-
-
Lee, P.J.E.F.1
-
31
-
-
0000653210
-
Selecting cryptographic key sizes
-
DOI 10.1007/s00145-001-0009-4
-
A. K. Lenstra and E. R. Verheul, Selecting Cryptographic Key Sizes, Journal of Cryptology: the journal of the International Association for Cryptologic Research 14 (2001), pp. 255-293. (Pubitemid 33770276)
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
32
-
-
0024078914
-
A probabilistic algorithm for computing minimum weights of large error-correcting codes
-
J. S. Leon, A probabilistic algorithm for computing minimum weights of large error-correcting codes, IEEE Transactions on Information Theory 34 (1988), pp. 1354-1359.
-
(1988)
IEEE Transactions on Information Theory
, vol.34
, pp. 1354-1359
-
-
Leon, J.S.1
-
33
-
-
0028294826
-
The Equivalence of McEliece's and Niederreiter's Public-Key Cryptosystems
-
Y. X. Li, R. H. Deng, and X. M. Wang, the Equivalence of McEliece's and Niederreiter's Public-Key Cryptosystems, IEEE Transactions on Information Theory 40 (1994), pp. 271-273.
-
(1994)
IEEE Transactions on Information Theory
, vol.40
, pp. 271-273
-
-
Li, Y.X.1
Deng, R.H.2
Wang, X.M.3
-
35
-
-
0035270825
-
Weak keys in the McEliece public-key cryptosystem
-
DOI 10.1109/18.915687, PII S0018944801015176
-
P. Loidreau and N. Sendrier, Weak keys in the McEliece public-key cryptosystem, IEEE Transactions on Information Theory 47 (2001), pp. 1207-1211. (Pubitemid 32425453)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.3
, pp. 1207-1211
-
-
Loidreau, P.1
Sendrier, N.2
-
37
-
-
0002448405
-
A public key cryptosystem based on algebraic coding theory
-
R. J. McEliece, A public key cryptosystem based on algebraic coding theory, DSN progress report 42-44 (1978), pp. 114-116.
-
(1978)
DSN Progress Report
, vol.42-44
, pp. 114-116
-
-
McEliece, R.J.1
-
38
-
-
84983157038
-
Quantum public key cryptosystems
-
Springer
-
T. Okamoto, K. Tanaka, and S. Uchiyama, Quantum Public Key Cryptosystems. Proc. Of CRYPTO 2000, LNCS, 1880, pp. 147-165, 2000, Springer.
-
(2000)
Proc. of CRYPTO 2000, LNCS
, vol.1880
, pp. 147-165
-
-
Okamoto, T.1
Tanaka, K.2
Uchiyama, S.3
-
39
-
-
33646185189
-
A new structural attack for GPT and variants
-
Springer
-
R. Overbeck, A new structural attack for GPT and variants. Proc. of Mycrypt 2005, LNCS 3715, pp. 50-63. Springer, 2005.
-
(2005)
Proc. of Mycrypt 2005, LNCS
, vol.3715
, pp. 50-63
-
-
Overbeck, R.1
-
40
-
-
33746393306
-
Statistical decoding revisited
-
DOI 10.1007/11780656-24, Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Proceedings
-
-, Statistical Decoding revisited. Proc. of ACISP 2006, LNCS 4058, pp. 283-294. Springer, 2006. (Pubitemid 44121001)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS
, pp. 283-294
-
-
Overbeck, R.1
-
41
-
-
0016487667
-
Algebraic Decoding of Goppa Codes
-
N. Patterson, Algebraic Decoding of Goppa Codes, IEEE Trans. Info. Theory 21 (1975), pp. 203-207.
-
(1975)
IEEE Trans. Info. Theory
, vol.21
, pp. 203-207
-
-
Patterson, N.1
-
42
-
-
84957795480
-
Chosen-Ciphertext Security for any One-Way Cryptosystem
-
Springer
-
D. Pointcheval, Chosen-Ciphertext Security for any One-Way Cryptosystem. Proc. of PKC, LNCS 1751, pp. 129-146. Springer, 2000.
-
(2000)
Proc. of PKC, LNCS
, vol.1751
, pp. 129-146
-
-
Pointcheval, D.1
-
43
-
-
3242867844
-
Cryptanalysis of Krouk's public-key cipher
-
V. C. Jr. Rocha, V. C. JR Da Rocha, and D. L. Macedo, Cryptanalysis of Krouk's public-key cipher, Electronics Letters 32 (1996), 1279-1280. (Pubitemid 126511297)
-
(1996)
Electronics Letters
, vol.32
, Issue.14
, pp. 1279-1280
-
-
Da Rocha Jr., V.C.1
Lopes De Macedo, D.2
-
44
-
-
0003941547
-
On the dimension of the hull
-
PII S0895480195294027
-
N. Sendrier, On the dimension of the hull, SIAM Journal on Discrete Mathematics 10 (1997), pp. 282-293. (Pubitemid 127577165)
-
(1997)
SIAM Journal on Discrete Mathematics
, vol.10
, Issue.2
, pp. 282-293
-
-
Sendrier, N.1
-
45
-
-
0034226112
-
Finding the permutation between equivalent linear codes: The support splitting algorithm
-
-, Finding the permutation between equivalent linear codes: the support splitting algorithm, IEEE Transactions on Information Theory 46 (2000), 1193-1203.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, pp. 1193-1203
-
-
Sendrier, N.1
-
46
-
-
33646166930
-
On the security of the McEliece public-key cryptosystem
-
M. Blaum, P. G. Farrell, and H. van Tilborg, eds. Kluwer
-
-, On the security of the McEliece public-key cryptosystem. Proceedings of Workshop honoring Prof. Bob McEliece on his 60th birthday (M. Blaum, P. G. Farrell, and H. van Tilborg, eds.), pp. 141-163. Kluwer, 2002.
-
(2002)
Proceedings of Workshop Honoring Prof. Bob McEliece on His 60th Birthday
, pp. 141-163
-
-
Sendrier, N.1
-
48
-
-
84929257781
-
On insecurity of cryptosystems based on generalized Reed-Solomon codes
-
V. M. Sidelnikov and S. O. Shestakov, On insecurity of cryptosystems based on generalized Reed-Solomon codes, Discrete Mathematics and Applications 2 (1992), 439-444.
-
(1992)
Discrete Mathematics and Applications
, vol.2
, pp. 439-444
-
-
Sidelnikov, V.M.1
Shestakov, S.O.2
-
49
-
-
84964937021
-
A method for finding codewords of small weight
-
J. Stern, A method for finding codewords of small weight, Coding Theory and Applications 388 (1989), pp. 106-133.
-
(1989)
Coding Theory and Applications
, vol.388
, pp. 106-133
-
-
Stern, J.1
-
50
-
-
84955595109
-
A new identification scheme based on syndrome decoding
-
Springer
-
-, A new identification scheme based on syndrome decoding. Advances in Cryptology - CRYPTO'93, LNCS 773. Springer, 1994.
-
(1994)
Advances in Cryptology - CRYPTO'93, LNCS
, vol.773
-
-
Stern, J.1
-
51
-
-
84858653249
-
Can one design a signature scheme based on error-correcting codes
-
-, Can one design a signature scheme based on error-correcting codes. ASIACRYPT '94, LNCS 917, pp. 424-426, 1995.
-
(1995)
ASIACRYPT '94, LNCS
, vol.917
, pp. 424-426
-
-
Stern, J.1
-
52
-
-
0025448457
-
Digital signature scheme based on error-correcting codes
-
W. Xinmei, Digital signature scheme based on error-correcting codes, Electronics Letters 26 (1990), pp. 898-899. (Pubitemid 20709324)
-
(1990)
Electronics Letters
, vol.26
, Issue.13
, pp. 898-899
-
-
Xinmei, W.1
|