-
1
-
-
83655202691
-
Distinguisher for high rate McEliece cryptosystems
-
presented at the Paraty, Brazil, Oct
-
J. Faugère, V. Gauthier-Umana, A. Otmani, L. Perret, and J. Tillich, "Distinguisher for high rate McEliece cryptosystems," presented at the Proc. IEEE Inf. Theory Workshop, Paraty, Brazil, Oct. 16-20, 2011.
-
(2011)
Proc. IEEE Inf. Theory Workshop
, pp. 16-20
-
-
Faugère, J.1
Gauthier-Umana, V.2
Otmani, A.3
Perret, L.4
Tillich, J.5
-
2
-
-
84929461941
-
How to achieve a McEliece-based digital signature scheme
-
N. T. Courtois, M. Finiasz, and N. Sendrier, "How to achieve a McEliece-based digital signature scheme," in Proc. 7th Int. Conf. Theory Appl. Cryptology Inf. Security, 2001, vol. 2248, pp. 157-174.
-
(2001)
Proc. 7th Int. Conf. Theory Appl. Cryptology Inf. Security
, vol.2248
, pp. 157-174
-
-
Courtois, N.T.1
Finiasz, M.2
Sendrier, N.3
-
3
-
-
0002448405
-
A public-key system based on algebraic coding theory jet propulsion lab Pasadena CA USA
-
R. J. McEliece, A Public-Key System Based on Algebraic Coding Theory Jet Propulsion Lab, Pasadena, CA, USA, 1978, dSN Progress Report 44.
-
(1978)
DSN Progress Report 44
-
-
McEliece, R.J.1
-
4
-
-
85034651324
-
An observation on the security of McEliece's public-key cryptosystem
-
Lecture Notes in Computer Science
-
P. J. Lee and E. F. Brickell, "An observation on the security of McEliece's public-key cryptosystem," in Proc. Adv. Cryptol.-EUROCRYPT, 1988, vol. 330/1988, Lecture Notes in Computer Science, pp. 275-280.
-
(1988)
Proc. Adv. Cryptol.-EUROCRYPT
, vol.330
, Issue.1988
, pp. 275-280
-
-
Lee, P.J.1
Brickell, E.F.2
-
5
-
-
0024078914
-
A probabilistic algorithm for computing minimum weights of large error-correcting codes
-
Sep
-
J. S. Leon, "A probabilistic algorithm for computing minimum weights of large error-correcting codes," IEEE Trans. Inf. Theory, vol. 34, no. 5, pp. 1354-1359, Sep. 1988.
-
(1988)
IEEE Trans. Inf. Theory
, vol.34
, Issue.5
, pp. 1354-1359
-
-
Leon, J.S.1
-
6
-
-
84964937021
-
A method for finding codewords of small weight
-
G. D. Cohen and J. Wolfmann, Eds. New York, NY, USA: Springer- Verlag Lecture Notes in Computer Science
-
J. Stern, "A method for finding codewords of small weight," in Coding Theory and Applications, G. D. Cohen and J. Wolfmann, Eds. New York, NY, USA: Springer-Verlag, 1988, vol. 388, Lecture Notes in Computer Science, pp. 106-113.
-
(1988)
Coding Theory and Applications
, vol.388
, pp. 106-113
-
-
Stern, J.1
-
7
-
-
0031675932
-
A new algorithm for finding minimum-weight words in a linear code: Application to mceliece's cryptosystem and to narrow-sense bch codes of length 511
-
PII S0018944898000182
-
A. Canteaut and F. Chabaud, "A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511," IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 367-378, Jan. 1998. (Pubitemid 128737912)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.1
, pp. 367-378
-
-
Canteaut, A.1
Chabaud, F.2
-
8
-
-
56749164782
-
Attacking and defending the McEliece cryptosystem
-
Lecture Notes in Computer Science
-
D. J. Bernstein, T. Lange, and C. Peters, "Attacking and defending the McEliece cryptosystem," in Proc. 2nd Int. Workshop Post-Quantum Cryptography, 2008, vol. 5299, Lecture Notes in Computer Science, pp. 31-46.
-
(2008)
Proc. 2nd Int. Workshop Post-Quantum Cryptography
, vol.5299
, pp. 31-46
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
9
-
-
80052013042
-
Smaller decoding exponents: Ball-collision decoding
-
Lecture Notes in Computer Science
-
D. J.Bernstein, T. Lange, andC. Peters, P.Rogaway, Ed., "Smaller decoding exponents: Ball-collision decoding," in Proc. 31st Annu. Conf. Adv. Cryptology, 2011, vol. 6841, Lecture Notes in Computer Science, pp. 743-760.
-
(2011)
Proc. 31st Annu. Conf. Adv. Cryptology
, vol.6841
, pp. 743-760
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
Rogaway, P.4
-
10
-
-
82955177030
-
Decoding random linear codes in
-
Lecture Notes in Computer Science
-
A. May, A. Meurer, and E. Thomae, D. H. Lee and X. Wang, Eds. , "Decoding random linear codes in ," in Proc. 17th Int. Conf. Theory Appl. Cryptology Inf. Security, 2011, vol. 7073, Lecture Notes in Computer Science, pp. 107-124.
-
(2011)
Proc. 17th Int. Conf. Theory Appl. Cryptology Inf. Security
, vol.7073
, pp. 107-124
-
-
May, A.1
Meurer, A.2
Thomae, E.3
Lee, D.H.4
Wang, X.5
-
11
-
-
84860003018
-
Decoding random binary linear codes in : How improves information set decoding
-
Lecture Notes in Computer Science
-
A. Becker, A. Joux, A. May, and A. Meurer, D. Pointcheval and T. Johansson, Eds., "Decoding random binary linear codes in : How improves information set decoding," in Proc. 31st Annu. Int. Conf. Theory Appl. Cryptographic Techn., 2012, vol. 7237, Lecture Notes in Computer Science, pp. 520-536.
-
(2012)
Proc. 31st Annu. Int. Conf. Theory Appl. Cryptographic Techn.
, vol.7237
, pp. 520-536
-
-
Becker, A.1
Joux, A.2
May, A.3
Meurer, A.4
Pointcheval, D.5
Johansson, T.6
-
12
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
E. Berlekamp, R. McEliece, and H. van Tilborg, "On the inherent intractability of certain coding problems," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 384-386, May 1978. (Pubitemid 8607605)
-
(1978)
IEEE Transactions on Information Theory
, vol.IT-24
, Issue.3
, pp. 384-386
-
-
Berlekamp Elwyn, R.1
McEliece Robert, J.2
Van Tilborg Henk, C.A.3
-
13
-
-
25444433745
-
Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem
-
Lecture Notes in Computer Science
-
J. Gibson, D. Davies, Ed., "Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem," in Proc. 10th Annu. Int. Conf. Theory Appl. Cryptographic Techn., Berlin/Heidelberg, 1991, vol. 547, Lecture Notes in Computer Science, pp. 517-521.
-
(1991)
Proc. 10th Annu. Int. Conf. Theory Appl. Cryptographic Techn., Berlin/Heidelberg
, vol.547
, pp. 517-521
-
-
Gibson, J.1
Davies, D.2
-
14
-
-
0035270825
-
Weak keys in the McEliece public-key cryptosystem
-
DOI 10.1109/18.915687, PII S0018944801015176
-
P. Loidreau and N. Sendrier, "Weak keys in the McEliece public-key cryptosystem," IEEE Trans. Inf. Theory, vol. 47, no. 3, pp. 1207-1211, Mar. 2001. (Pubitemid 32425453)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.3
, pp. 1207-1211
-
-
Loidreau, P.1
Sendrier, N.2
-
15
-
-
51349142711
-
Semantic security for the McEliece cryptosystem without random oracles
-
R. Nojima, H. Imai, K. Kobara, and K. Morozov, "Semantic security for the McEliece cryptosystem without random oracles," Des. Codes Cryptography, vol. 49, no. 1-3, pp. 289-305, 2008.
-
(2008)
Des. Codes Cryptography
, vol.49
, Issue.1-3
, pp. 289-305
-
-
Nojima, R.1
Imai, H.2
Kobara, K.3
Morozov, K.4
-
16
-
-
67650102558
-
A CCA2 secure public key encryption scheme based on theMcEliece assumptions in the standard model
-
R. Dowsley, J. Müller-Quade, and A. C. A. Nascimento, "A CCA2 secure public key encryption scheme based on theMcEliece assumptions in the standard model," in Proc. Topics Cryptology, 2009, pp. 240-251.
-
(2009)
Proc. Topics Cryptology
, pp. 240-251
-
-
Dowsley, R.1
Müller-Quade, J.2
Nascimento, A.C.A.3
-
17
-
-
84884495237
-
Towards a concrete security proof of Courtois, Finiasz and Sendrier signature scheme
-
L. Dallot, "Towards a concrete security proof of Courtois, Finiasz and Sendrier signature scheme," in Proc. Res. Cryptology, 2007, pp. 65-77.
-
(2007)
Proc. Res. Cryptology
, pp. 65-77
-
-
Dallot, L.1
-
18
-
-
72449174805
-
Security bounds for the design of code-based cryptosystems
-
Lecture Notes in Computer Science
-
M. Finiasz and N. Sendrier, M. Matsui, Ed., "Security bounds for the design of code-based cryptosystems," in Proc. 15th Int. Conf. Theory Appl. Cryptology Inf. Security, 2009, vol. 5912, Lecture Notes in Computer Science, pp. 88-105.
-
(2009)
Proc. 15th Int. Conf. Theory Appl. Cryptology Inf. Security
, vol.5912
, pp. 88-105
-
-
Finiasz, M.1
Sendrier, N.2
Matsui Ed, M.3
-
19
-
-
77954636190
-
Algebraic cryptanalysis of McEliece variants with compact keys
-
Lecture Notes in Computer Science
-
J.-C. Faugère, A. Otmani, L. Perret, and J.-P. Tillich, H. Gilbert, Ed., "Algebraic cryptanalysis of McEliece variants with compact keys," in Proc. 29th Annu. Int. Conf. Theory Appl. Cryptographic Techn., 2010, vol. 6110, Lecture Notes in Computer Science, pp. 279-298.
-
(2010)
Proc. 29th Annu. Int. Conf. Theory Appl. Cryptographic Techn.
, vol.6110
, pp. 279-298
-
-
Faugère, J.-C.1
Otmani, A.2
Perret, L.3
Tillich, J.-P.4
Gilbert Ed, H.5
-
20
-
-
0347487953
-
A new class of linear correcting codes
-
V. D. Goppa, "A new class of linear correcting codes," Problems Peredachi Inf., vol. 6, no. 3, pp. 24-30, 1970.
-
(1970)
Problems Peredachi Inf.
, vol.6
, Issue.3
, pp. 24-30
-
-
Goppa, V.D.1
-
22
-
-
0016487667
-
The algebraic decoding of Goppa codes
-
Mar
-
N. Patterson, "The algebraic decoding of Goppa codes," IEEE Trans. Inf. Theory, vol. IT-21, no. 2, pp. 203-207, Mar. 1975.
-
(1975)
IEEE Trans. Inf. Theory
, vol.2
, Issue.IT-21
, pp. 203-207
-
-
Patterson, N.1
-
24
-
-
77952288288
-
A further improvement of the work factor in an attempt at breaking McEliece's cryptosystem
-
A. Canteaut and H. Chabanne, "A further improvement of the work factor in an attempt at breaking McEliece's cryptosystem," in EUROCODE, 1994, pp. 169-173.
-
(1994)
EUROCODE
, pp. 169-173
-
-
Canteaut, A.1
Chabanne, H.2
-
26
-
-
0030286942
-
Suboptimal decoding of linear codes: Partition technique
-
PII S0018944896073063
-
I. Dumer, "Suboptimal decoding of linear codes : Partition techniques," IEEE Trans. Inf. Theory, vol. 42, no. 6, pp. 1971-1986, Nov. 1996. (Pubitemid 126769191)
-
(1996)
IEEE Transactions on Information Theory
, vol.42
, Issue.6 PART 1
, pp. 1971-1986
-
-
Dumer, I.1
-
27
-
-
84947809062
-
Cryptanalysis of the original mceliece cryptosystem
-
Advances in Cryptology - ASIACRYPT '98
-
A. Canteaut and N. Sendrier, "Cryptanalysis of the original McEliece cryptosystem," in Adv. Cryptology, 1998, Lecture Notes in Computer Sscience, pp. 187-199, 1514. (Pubitemid 128151411)
-
(1998)
Lecture Notes in Computer Science
, Issue.1514
, pp. 187-199
-
-
Canteaut, A.1
Sendrier, N.2
-
28
-
-
84855280610
-
On the use of structured codes in code based cryptography
-
Contactforum
-
N. Sendrier, S. Nikova, B. Preneel, and L. Storme, Eds., "On the use of structured codes in code based cryptography," in Coding Theory Cryptography 3, 2009, Contactforum, pp. 59-68.
-
(2009)
Coding Theory Cryptography
, vol.3
, pp. 59-68
-
-
Sendrier, N.1
Nikova, S.2
Preneel, B.3
Storme, L.4
-
29
-
-
0034226112
-
Finding the permutation between equivalent linear codes: The support splitting algorithm
-
Jul
-
N. Sendrier, "Finding the permutation between equivalent linear codes: The support splitting algorithm," IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1193-1203, Jul. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1193-1203
-
-
Sendrier, N.1
-
30
-
-
80052020068
-
McEliece and Niederreiter cryptosystems that resist quantum Fourier sampling attacks
-
Lecture Notes in Computer Science
-
H. Dinh, C. Moore, and A. Russell, P. Rogaway, Ed., "McEliece and Niederreiter cryptosystems that resist quantum Fourier sampling attacks," in Crypto, 2011, vol. 6841, Lecture Notes in Computer Science, pp. 761-779.
-
(2011)
Crypto
, vol.6841
, pp. 761-779
-
-
Dinh, H.1
Moore, C.2
Russell, A.3
Rogaway, P.4
-
31
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
PII S0097539795293172
-
P. W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM J. Comput., vol. 26, no. 5, pp. 1484-1509, 1997. (Pubitemid 127613100)
-
(1997)
SIAM Journal on Computing
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.W.1
-
32
-
-
84937393537
-
Semantically secure McEliece public-key cryptosystems - Conversions for McEliece PKC
-
Public Key Cryptography
-
K. Kobara and H. Imai, K. Kim, Ed., "Semantically secure McEliece public-key cryptosystems-conversions for McEliece PKC," in Proc. 4th Int. Workshop Practice Theory Public Key Cryptography, Cheju Island, Korea, 2001, vol. 1992, Lecture Notes in Computer Science, pp. 19-35. (Pubitemid 33232930)
-
(2001)
Lecture Notes in Computer Science
, Issue.1992
, pp. 19-35
-
-
Kobara, K.1
Imai, H.2
-
33
-
-
51349142711
-
Semantic security for the McEliece cryptosystem without random oracles
-
R. Nojima, H. Imai, K. Kobara, and K. Morozov, "Semantic security for the McEliece cryptosystem without random oracles," Des. Codes Cryptography, vol. 49, no. 1-3, pp. 289-305, 2008.
-
(2008)
Des. Codes Cryptography
, vol.49
, Issue.1-3
, pp. 289-305
-
-
Nojima, R.1
Imai, H.2
Kobara, K.3
Morozov, K.4
-
34
-
-
67650102558
-
A CCA2 secure public key encryption scheme based on theMcEliece assumptions in the standard model
-
R. Dowsley, J. Müller-Quade, and A. C. A. Nascimento, "A CCA2 secure public key encryption scheme based on theMcEliece assumptions in the standard model," in Proc. Cryptographers' Track RSA Conf. Topics Cryptology, 2009, pp. 240-251.
-
(2009)
Proc. Cryptographers' Track RSA Conf. Topics Cryptology
, pp. 240-251
-
-
Dowsley, R.1
Müller-Quade, J.2
Nascimento, A.C.A.3
-
35
-
-
70350633827
-
Reducing key length of the McEliece cryptosystem
-
Jun. 21-25 LectureNotes in Computer Science
-
T. P. Berger, P. Cayrel, P. Gaborit, and A. Otmani, B. Preneel, Ed., "Reducing key length of the McEliece cryptosystem," in Progr. Cryptology-Second Int. Conf. Cryptology Africa, Gammarth, Tunisia, Jun. 21-25, 2009, vol. 5580, LectureNotes in Computer Science, pp. 77-97.
-
(2009)
Progr. Cryptology-Second Int. Conf. Cryptology Africa, Gammarth, Tunisia
, vol.5580
, pp. 77-97
-
-
Berger, T.P.1
Cayrel, P.2
Gaborit, P.3
Otmani, A.4
Preneel Ed, B.5
-
36
-
-
84860738344
-
Compact McEliece keys from Goppa codes
-
presented at the Aug. 13-14
-
R. Misoczki and P. S. L. M. Barreto, "Compact McEliece keys from Goppa codes," presented at the Select. Areas Cryptography, Calgary, Canada, Aug. 13-14, 2009.
-
(2009)
Select Areas Cryptography, Calgary, Canada
-
-
Misoczki, R.1
Barreto, P.S.L.M.2
-
37
-
-
0033143274
-
A new efficient algorithm for computing Gröbner bases (f4)
-
J.-C. Faugère, "A new efficient algorithm for computing Gröbner bases (f4)," J. Pure Appl. Algebra, vol. 139, no. 1-3, pp. 61-88, 1999.
-
(1999)
J. Pure Appl. Algebra
, vol.139
, Issue.1-3
, pp. 61-88
-
-
Faugère, J.-C.1
-
39
-
-
0031232428
-
The Magma algebra system I: The user language
-
W. Bosma, J. J. Cannon, and C. Playoust, "The Magma algebra system-Part I: The user language," J. Symp. Comput., vol. 24, no. 3-4, pp. 235-265, 1997. (Pubitemid 127167874)
-
(1997)
Journal of Symbolic Computation
, vol.24
, Issue.3-4
, pp. 235-265
-
-
Bosma, W.1
Cannon, J.2
Playoust, C.3
-
40
-
-
0034356854
-
On the distribution of rank of a random matrix over a finite field
-
C. Cooper, "On the distribution of rank of a random matrix over a finite field," Random Struct. Algorithms, vol. 17, no. 3-4, pp. 197-212, 2000.
-
(2000)
Random Struct. Algorithms
, vol.17
, Issue.3-4
, pp. 197-212
-
-
Cooper, C.1
-
41
-
-
84884494697
-
Error-correcting pairs for a public-key cryptosystem
-
presented at the [Online]. Available
-
I. Marquez-Corbella and R. Pellikaan, "Error-correcting pairs for a public-key cryptosystem," presented at the Proc. Code-based Cryptography Workshop, 2012 [Online]. Available: http://www.win.tue.nl/ruudp/paper/60.pdf
-
(2012)
Proc. Code-based Cryptography Workshop
-
-
Marquez-Corbella, I.1
Pellikaan, R.2
-
42
-
-
84884470722
-
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
-
A. Couvreur, P. Gaborit, V. Gauthier, A. Otmani, and J. Tillich, "Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes," in Proc. Int. Workshop Coding Cryptography, Bergen, Norway, 2013, pp. 181-193.
-
(2013)
Proc. Int. Workshop Coding Cryptography, Bergen, Norway
, pp. 181-193
-
-
Couvreur, A.1
Gaborit, P.2
Gauthier, V.3
Otmani, A.4
Tillich, J.5
-
43
-
-
0000966673
-
Advances in Cryptology-CRYPTO 2011-31st Annual Cryptology Conference
-
Santa Barbara, CA, USA, August 14-18, 2011, ser Springer
-
, P. Rogaway, Ed., Advances in Cryptology-CRYPTO 2011-31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011, ser. Lecture Notes in Computer Science. : Springer, 2011, vol. 6841.
-
(2011)
Lecture Notes in Computer Science.
, vol.6841
-
-
Rogaway, P.1
|