-
1
-
-
84929461941
-
How to Achieve a McEliece-Based Digital Signature Scheme
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Courtois, N.T., Finiasz, M., Sendrier, N.: How to Achieve a McEliece-Based Digital Signature Scheme. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 157-174. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 157-174
-
-
Courtois, N.T.1
Finiasz, M.2
Sendrier, N.3
-
2
-
-
0002448405
-
A public-key cryptosystem based on algebraic coding theory
-
Jet Prop. Lab., California Inst. Technol., Pasadena, CA, January
-
McEliece, R.: A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep., Jet Prop. Lab., California Inst. Technol., Pasadena, CA, 114-116 (January 1978)
-
(1978)
DSN Prog. Rep.
, pp. 114-116
-
-
McEliece, R.1
-
3
-
-
75149129797
-
-
Rapport de recherche 5158, INRIA
-
Beuchat, J.L., Sendrier, N., Tisserand, A., Villard, G.: FPGA implementation of a recently published signature scheme. Rapport de recherche 5158, INRIA (2004)
-
(2004)
FPGA Implementation of a Recently Published Signature Scheme
-
-
Beuchat, J.L.1
Sendrier, N.2
Tisserand, A.3
Villard, G.4
-
4
-
-
83655202691
-
A distinguisher for high rate McEliece cryptosystems
-
October
-
Faugère, J.C., Gauthier, V., Otmani, A., Perret, L., Tillich, J.P.: A distinguisher for high rate McEliece cryptosystems. In: ITW 2011, Paraty, Brazil, pp. 282-286 (October 2011)
-
(2011)
ITW 2011, Paraty, Brazil
, pp. 282-286
-
-
Faugère, J.C.1
Gauthier, V.2
Otmani, A.3
Perret, L.4
Tillich, J.P.5
-
5
-
-
79952580226
-
Parallel-CFS: Strengthening the CFS McEliece-Based Signature Scheme
-
Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. Springer, Heidelberg
-
Finiasz, M.: Parallel-CFS: Strengthening the CFS McEliece-Based Signature Scheme. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 159-170. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6544
, pp. 159-170
-
-
Finiasz, M.1
-
6
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
May
-
Berlekamp, E., McEliece, R., van Tilborg, H.: On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory 24(3) (May 1978)
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.3
-
-
Berlekamp, E.1
McEliece, R.2
Van Tilborg, H.3
-
7
-
-
33746812562
-
The use of information sets in decoding cyclic codes
-
Prange, E.: The use of information sets in decoding cyclic codes. IRE Transactions IT-8, S5-S9 (1962)
-
(1962)
IRE Transactions
, vol.IT-8
-
-
Prange, E.1
-
8
-
-
84964937021
-
A Method for Finding Codewords of Small Weight
-
Cohen, G., Wolfmann, J. (eds.) Coding Theory 1988. Springer, Heidelberg
-
Stern, J.: A Method for Finding Codewords of Small Weight. In: Cohen, G., Wolfmann, J. (eds.) Coding Theory 1988. LNCS, vol. 388, pp. 106-113. Springer, Heidelberg (1989)
-
(1989)
LNCS
, vol.388
, pp. 106-113
-
-
Stern, J.1
-
9
-
-
80052013042
-
Smaller Decoding Exponents: Ball-Collision Decoding
-
Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
-
Bernstein, D.J., Lange, T., Peters, C.: Smaller Decoding Exponents: Ball-Collision Decoding. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 743-760. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 743-760
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
10
-
-
82955177030
-
0.054n)
-
Lee, D., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg
-
0.054n). In: Lee, D., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 107-124. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7073
, pp. 107-124
-
-
May, A.1
Meurer, A.2
Thomae, E.3
-
11
-
-
84937428040
-
A Generalized Birthday Problem
-
Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
Wagner, D.: A Generalized Birthday Problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 288-303. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 288-303
-
-
Wagner, D.1
-
12
-
-
84985833502
-
The Knapsack Hash Function Proposed at Crypto 1989 Can Be Broken
-
Davies, D.W. (ed.) EUROCRYPT 1991. Springer, Heidelberg
-
Camion, P., Patarin, J.: The Knapsack Hash Function Proposed at Crypto 1989 Can Be Broken. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 39-53. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 39-53
-
-
Camion, P.1
Patarin, J.2
-
13
-
-
33646172531
-
Cryptanalysis of a provably secure cryptographic hash function
-
ePrint Archive, Report 2004/013
-
Coron, J.S., Joux, A.: Cryptanalysis of a provably secure cryptographic hash function. Cryptology ePrint Archive, Report 2004/013 (2004), http://eprint.iacr.org/
-
(2004)
Cryptology
-
-
Coron, J.S.1
Joux, A.2
-
14
-
-
77954400700
-
Code-based cryptography
-
Bernstein, D., Buchmann, J., Dahmen, E. (eds.) Springer
-
Overbeck, R., Sendrier, N.: Code-based cryptography. In: Bernstein, D., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 95-145. Springer (2009)
-
(2009)
Post-Quantum Cryptography
, pp. 95-145
-
-
Overbeck, R.1
Sendrier, N.2
-
15
-
-
0036794609
-
On the complexity of some cryptographic problems based on the general decoding problem
-
Johansson, T., Jönsson, F.: On the complexity of some cryptographic problems based on the general decoding problem. IEEE-IT 48(10), 2669-2678 (2002)
-
(2002)
IEEE-IT
, vol.48
, Issue.10
, pp. 2669-2678
-
-
Johansson, T.1
Jönsson, F.2
-
16
-
-
82955190473
-
Decoding One out of Many
-
Yang, B.-Y. (ed.) PQCrypto 2011. Springer, Heidelberg
-
Sendrier, N.: Decoding One Out of Many. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 51-67. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7071
, pp. 51-67
-
-
Sendrier, N.1
-
18
-
-
72449174805
-
Security Bounds for the Design of Code-Based Cryptosystems
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Finiasz, M., Sendrier, N.: Security Bounds for the Design of Code-Based Cryptosystems. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 88-105. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 88-105
-
-
Finiasz, M.1
Sendrier, N.2
-
19
-
-
84860003018
-
n/20: How 1 + 1 = 0 Improves Information Set Decoding
-
Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg
-
n/20: How 1 + 1 = 0 Improves Information Set Decoding. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 520-536. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7237
, pp. 520-536
-
-
Becker, A.1
Joux, A.2
May, A.3
Meurer, A.4
-
21
-
-
84937740421
-
Shift-register synthesis and BCH decoding
-
Massey, J.: Shift-register synthesis and BCH decoding. IEEE Transactions on Information Theory 15(1), 122-127 (1969)
-
(1969)
IEEE Transactions on Information Theory
, vol.15
, Issue.1
, pp. 122-127
-
-
Massey, J.1
|