-
2
-
-
79958014269
-
Improved generic algorithms for hard knapsacks
-
Paterson, K.G. (ed.) EUROCRYPT 2011 Springer, Heidelberg
-
Becker, A., Coron, J.-S., Joux, A.: Improved Generic Algorithms for Hard Knapsacks. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 364-385. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 364-385
-
-
Becker, A.1
Coron, J.-S.2
Joux, A.3
-
3
-
-
84860011881
-
-
Full Version
-
Becker, A., Joux, A., May, A., Meurer, A.: Decoding Random Binary Linear Codes in 2n/20: How 1 + 1 = 0 Improves Information Set Decoding. Full Version, http://eprint.iacr.org
-
Decoding Random Binary Linear Codes in 2n/20: How 1 + 1 = 0 Improves Information Set Decoding
-
-
Becker, A.1
Joux, A.2
May, A.3
Meurer, A.4
-
4
-
-
56749164782
-
Attacking and defending the mceliece cryptosystem
-
Buchmann, J., Ding, J. (eds.) PQCrypto 2008 Springer, Heidelberg
-
Bernstein, D.J., Lange, T., Peters, C.: Attacking and Defending the McEliece Cryptosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5299
, pp. 31-46
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
5
-
-
80052013042
-
Smaller decoding exponents: Ball-collision decoding
-
Rogaway, P. (ed.) CRYPTO 2011 Springer, Heidelberg
-
Bernstein, D.J., Lange, T., Peters, C.: Smaller Decoding Exponents: Ball-Collision Decoding. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 743-760. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 743-760
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
6
-
-
0017973512
-
On the inherent intractability of certain coding problems IEEE
-
Elwyn, R.J.M., Berlekamp, R., van Tilborg, H.C.: On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory 24, 384-386 (1978)
-
(1978)
Transactions on Information Theory
, vol.24
, pp. 384-386
-
-
Elwyn, R.J.M.1
Berlekamp, R.2
Van Tilborg, H.C.3
-
7
-
-
0005710304
-
Lower asymptotic bound on the number of linear code words in a sphere of given radius in Fnq
-
Blinovskii, V.M.: Lower asymptotic bound on the number of linear code words in a sphere of given radius in Fnq . Probl. Peredach. Inform. 23, 50-53 (1987)
-
(1987)
Probl. Peredach. Inform.
, vol.23
, pp. 50-53
-
-
Blinovskii, V.M.1
-
8
-
-
0031675932
-
A new algorithm for finding minimum-weight words in a linear code: Application to mceliece's cryptosystem and to narrow-sense bch codes of length 511
-
Canteaut, A., Chabaud, F.: A new algorithm for finding minimum-weight words in a linear code: Application to mceliece's cryptosystem and to narrow-sense bch codes of length 511. IEEE Transactions on Information Theory 44(1), 367-378 (1998)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.1
, pp. 367-378
-
-
Canteaut, A.1
Chabaud, F.2
-
11
-
-
79960766850
-
A distinguisher for high rate mceliece cryptosystems
-
full version available as eprint Report 2010/331
-
Faug̀ere, J.-C., Otmani, A., Perret, L., Tillich, J.-P.: A Distinguisher for High Rate McEliece Cryptosystems. In: YACC 2010, full version available as eprint Report 2010/331 (2010)
-
(2010)
YACC 2010
-
-
Faug̀ere, J.-C.1
Otmani, A.2
Perret, L.3
Tillich, J.-P.4
-
12
-
-
72449174805
-
Security bounds for the design of code-based cryptosystems
-
Matsui, M. (ed.) ASIACRYPT 2009 Springer, Heidelberg
-
Finiasz, M., Sendrier, N.: Security Bounds for the Design of Code-Based Cryptosystems. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 88-105. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 88-105
-
-
Finiasz, M.1
Sendrier, N.2
-
14
-
-
70349284581
-
Secure human identification protocols
-
Boyd, C. (ed.) ASIACRYPT 2001 Springer, Heidelberg
-
Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52-66. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
15
-
-
77954651737
-
New generic algorithms for hard knapsacks
-
Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
-
Howgrave-Graham, N., Joux, A.: New Generic Algorithms for Hard Knapsacks. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 235-256. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 235-256
-
-
Howgrave-Graham, N.1
Joux, A.2
-
16
-
-
84859947652
-
A variant of a public key cryptosystem based on goppa codes
-
Jordan, J.P.: A variant of a public key cryptosystem based on goppa codes. SIGACTNews 15, 61-66 (1983)
-
(1983)
SIGACT News
, vol.15
, pp. 61-66
-
-
Jordan, J.P.1
-
17
-
-
79957999442
-
Efficient authentication from hard learning problems
-
Paterson, K.G. (ed.) EUROCRYPT 2011 Springer, Heidelberg
-
Kiltz, E., Pietrzak, K., Cash, D., Jain, A., Venturi, D.: Efficient Authentication from Hard Learning Problems. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 7-26. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 7-26
-
-
Kiltz, E.1
Pietrzak, K.2
Cash, D.3
Jain, A.4
Venturi, D.5
-
19
-
-
85034651324
-
An observation on the security of mceliece's public-key cryptosystem
-
G̈unther, C.G. (ed.) EUROCRYPT 1988 Springer, Heidelberg
-
Lee, P.J.,Brickell, E.F.:An Observation on the Security of McEliece's Public-Key Cryptosystem. In: G̈unther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 275-280. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.330
, pp. 275-280
-
-
Lee, P.J.1
Brickell, E.F.2
-
20
-
-
0024078914
-
A probabilistic algorithm for computing minimum weights of large errorcorrecting codes IEEE
-
Leon, J.S.: A probabilistic algorithm for computing minimum weights of large errorcorrecting codes. IEEE Transactions on Information Theory 34(5), 1354-1359 (1988)
-
(1988)
Transactions on Information Theory
, vol.34
, Issue.5
, pp. 1354-1359
-
-
Leon, J.S.1
-
21
-
-
11744358774
-
Covering radius of almost all linear codes satisfies the Goblick bound
-
Kobe, Japan
-
Levitin, L.B.: Covering radius of almost all linear codes satisfies the Goblick bound. In: IEEE Internat. Symp. on Information Theory, Kobe, Japan (1988)
-
(1988)
IEEE Internat. Symp. on Information Theory
-
-
Levitin, L.B.1
-
23
-
-
82955177030
-
Decoding random linear codes in Õ(20.054n)
-
Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011 Springer, Heidelberg
-
May, A., Meurer, A., Thomae, E.: Decoding Random Linear Codes in Õ(20.054n). In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 107-124. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7073
, pp. 107-124
-
-
May, A.1
Meurer, A.2
Thomae, E.3
-
24
-
-
0009268999
-
Distribution of modular sums and the security of the server aided exponentiation
-
Singapore 1999
-
Nguyen, P.Q., Shparlinski, I.E., Stern, J.: Distribution of modular sums and the security of the server aided exponentiation. In: Progress in Computer Science and Applied Logic. Final Proceedings of Cryptography and Computational Number Theory Workshop, Singapore 1999, vol. 20, pp. 331-224 (2001)
-
(2001)
Progress in Computer Science and Applied Logic. Final Proceedings of Cryptography and Computational Number Theory Workshop
, vol.20
, pp. 331-224
-
-
Nguyen, P.Q.1
Shparlinski, I.E.2
Stern, J.3
-
25
-
-
33746812562
-
The use of information sets in decoding cyclic codes
-
Prange, E.: The Use of Information Sets in Decoding Cyclic Codes. IRE Transaction on Information Theory 8(5), 5-9 (1962)
-
(1962)
IRE Transaction on Information Theory
, vol.8
, Issue.5
, pp. 5-9
-
-
Prange, E.1
-
26
-
-
77954391096
-
Information-set decoding for linear codes over Fq
-
Sendrier, N. (ed.) PQCrypto 2010 Springer, Heidelberg
-
Peters, C.: Information-Set Decoding for Linear Codes over Fq. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol. 6061, pp. 81-94. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6061
, pp. 81-94
-
-
Peters, C.1
-
28
-
-
0034226112
-
Finding the permutation between equivalent linear codes: The support splitting algorithm
-
Sendrier, N.: Finding the permutation between equivalent linear codes: The support splitting algorithm. IEEE Transactions on Information Theory 46, 1193-1203 (2000)
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, pp. 1193-1203
-
-
Sendrier, N.1
-
29
-
-
33646166930
-
On the security of the McEliece public-key cryptosystem
-
Blaum, M., Farrell, P., van Tilborg, H. (eds.) Kluwer Proceedings of Workshop honoring Prof. Bob McEliece on his 60th birthday
-
Sendrier, N.: On the security of the McEliece public-key cryptosystem. In: Blaum, M., Farrell, P., van Tilborg, H. (eds.) Information, Coding andMathematics, pp. 141-163. Kluwer (2002); Proceedings of Workshop honoring Prof. Bob McEliece on his 60th birthday
-
(2002)
Information, Coding and Mathematics
, pp. 141-163
-
-
Sendrier, N.1
-
30
-
-
84964937021
-
A method for finding codewords of small weight
-
Wolfmann, J., Cohen, G. (eds.) Coding Theory 1988 Springer, Heidelberg
-
Stern, J.: A Method for Finding Codewords of Small Weight. In: Wolfmann, J., Cohen, G. (eds.) Coding Theory 1988. LNCS, vol. 388, pp. 106-113. Springer, Heidelberg (1989)
-
(1989)
LNCS
, vol.388
, pp. 106-113
-
-
Stern, J.1
-
31
-
-
84937428040
-
A generalized birthday problem
-
Yung, M. (ed.) CRYPTO 2002 Springer, Heidelberg
-
Wagner, D.: A Generalized Birthday Problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 288-303. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 288-303
-
-
Wagner, D.1
|