-
1
-
-
84905884450
-
-
arxiv:1108.2462v2[cs.IT] submitted
-
Baldi, M., Bianchi, M., Chiaraluce, F., Rosenthal, J., Schipani, D.: Enhanced public key security for the McEliece cryptosystem. arxiv:1108. 2462v2[cs.IT] (2011) (submitted)
-
(2011)
Enhanced Public Key Security for the McEliece Cryptosystem
-
-
Baldi, M.1
Bianchi, M.2
Chiaraluce, F.3
Rosenthal, J.4
Schipani, D.5
-
2
-
-
52149114896
-
A new analysis of the McEliece cryptosystem based on QC-LDPC codes
-
Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. Springer, Heidelberg
-
Baldi, M., Bodrato, M., Chiaraluce, F.: A new analysis of the McEliece cryptosystem based on QC-LDPC codes. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 246-262. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5229
, pp. 246-262
-
-
Baldi, M.1
Bodrato, M.2
Chiaraluce, F.3
-
3
-
-
84860003018
-
n/20: How 1 + 1 = 0 improves information set decoding
-
Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg
-
n/20: How 1 + 1 = 0 improves information set decoding. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 520-536. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7237
, pp. 520-536
-
-
Becker, A.1
Joux, A.2
May, A.3
Meurer, A.4
-
4
-
-
14844342361
-
How to mask the structure of codes for a cryptographic use
-
Berger, T.P., Loidreau, P.: How to mask the structure of codes for a cryptographic use. Des. Codes Cryptogr. 35(1), 63-79 (2005)
-
(2005)
Des. Codes Cryptogr.
, vol.35
, Issue.1
, pp. 63-79
-
-
Berger, T.P.1
Loidreau, P.2
-
5
-
-
56749164782
-
Attacking and defending the McEliece cryptosystem
-
Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
-
Bernstein, D.J., Lange, T., Peters, C.: Attacking and defending the McEliece cryptosystem. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 31-46. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5299
, pp. 31-46
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
6
-
-
79952615449
-
Wild mcEliece
-
Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. Springer, Heidelberg
-
Bernstein, D.J., Lange, T., Peters, C.: Wild mcEliece. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 143-158. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6544
, pp. 143-158
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
7
-
-
82955186254
-
Wild mcEliece incognito
-
Yang, B.-Y. (ed.) PQCrypto 2011. Springer, Heidelberg
-
Bernstein, D.J., Lange, T., Peters, C.: Wild mcEliece incognito. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 244-254. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7071
, pp. 244-254
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
9
-
-
0031232428
-
The Magma algebra system I: The user language
-
Bosma, W., Cannon, J.J., Playoust, C.: The Magma algebra system I: The user language. J. Symbolic Comput. 24(3/4), 235-265 (1997)
-
(1997)
J. Symbolic Comput.
, vol.24
, Issue.3-4
, pp. 235-265
-
-
Bosma, W.1
Cannon, J.J.2
Playoust, C.3
-
10
-
-
0031675932
-
A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
-
Canteaut, A., Chabaud, F.: A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511. IEEE Trans. Inform. Theory 44(1), 367-378 (1998)
-
(1998)
IEEE Trans. Inform. Theory
, vol.44
, Issue.1
, pp. 367-378
-
-
Canteaut, A.1
Chabaud, F.2
-
11
-
-
70350343371
-
Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Cascudo, I., Chen, H., Cramer, R., Xing, C.: Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 466-486. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 466-486
-
-
Cascudo, I.1
Chen, H.2
Cramer, R.3
Xing, C.4
-
12
-
-
80051980228
-
The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing
-
Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
-
Cascudo, I., Cramer, R., Xing, C.: The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 685-705. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 685-705
-
-
Cascudo, I.1
Cramer, R.2
Xing, C.3
-
13
-
-
84905217777
-
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
-
ArXiv:1307.6458 To appear in
-
Couvreur, A., Gaborit, P., Gauthier-Umaña, V., Otmani, A., Tillich, J.-P.: Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes. ArXiv:1307.6458 (2014) To appear in Des. Codes Cryptogr.
-
(2014)
Des. Codes Cryptogr.
-
-
Couvreur, A.1
Gaborit, P.2
Gauthier-Umaña, V.3
Otmani, A.4
Tillich, J.-P.5
-
16
-
-
83655202691
-
A distinguisher for high rate McEliece cryptosystems
-
Faugère, J.-C., Gauthier-Umaña, V., Otmani, A., Perret, L., Tillich, J.-P.: A distinguisher for high rate McEliece cryptosystems. In: Proceedings of the Information Theory Workshop 2011, ITW 2011, Paraty, Brasil, pp. 282-286 (2011)
-
(2011)
Proceedings of the Information Theory Workshop 2011, ITW 2011, Paraty, Brasil
, pp. 282-286
-
-
Faugère, J.-C.1
Gauthier-Umaña, V.2
Otmani, A.3
Perret, L.4
Tillich, J.-P.5
-
17
-
-
84884481641
-
A distinguisher for high rate McEliece cryptosystems
-
Faugère, J.-C., Gauthier-Umaña, V., Otmani, A., Perret, L., Tillich, J.-P.: A distinguisher for high rate McEliece cryptosystems. IEEE Trans. Inform. Theory 59(10), 6830-6844 (2013)
-
(2013)
IEEE Trans. Inform. Theory
, vol.59
, Issue.10
, pp. 6830-6844
-
-
Faugère, J.-C.1
Gauthier-Umaña, V.2
Otmani, A.3
Perret, L.4
Tillich, J.-P.5
-
18
-
-
77954636190
-
Algebraic cryptanalysis of mcEliece variants with compact keys
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Faugère, J.-C., Otmani, A., Perret, L., Tillich, J.-P.: Algebraic cryptanalysis of mcEliece variants with compact keys. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 279-298. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 279-298
-
-
Faugère, J.-C.1
Otmani, A.2
Perret, L.3
Tillich, J.-P.4
-
19
-
-
77954634561
-
Cryptanalysis of the McEliece cryptosystem over hyperelliptic curves
-
June
-
Faure, C., Minder, L.: Cryptanalysis of the McEliece cryptosystem over hyperelliptic curves. In: Proceedings of the Eleventh International Workshop on Algebraic and Combinatorial Coding Theory, Pamporovo, Bulgaria, pp. 99-107 (June 2008)
-
(2008)
Proceedings of the Eleventh International Workshop on Algebraic and Combinatorial Coding Theory, Pamporovo, Bulgaria
, pp. 99-107
-
-
Faure, C.1
Minder, L.2
-
21
-
-
25444433745
-
Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem
-
Davies, D.W. (ed.) EUROCRYPT 1991. Springer, Heidelberg
-
Gibson, J.K.: Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 517-521. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 517-521
-
-
Gibson, J.K.1
-
22
-
-
0346871653
-
McEliece public key cryptosystems using algebraic-geometric codes
-
Janwa, H., Moreno, O.: McEliece public key cryptosystems using algebraic-geometric codes. Des. Codes Cryptogr. 8(3), 293-307 (1996)
-
(1996)
Des. Codes Cryptogr.
, vol.8
, Issue.3
, pp. 293-307
-
-
Janwa, H.1
Moreno, O.2
-
24
-
-
84884480571
-
An efficient attack of a mcEliece cryptosystem variant based on convolutional codes
-
Gaborit, P. (ed.) PQCrypto 2013. Springer, Heidelberg
-
Landais, G., Tillich, J.-P.: An efficient attack of a mcEliece cryptosystem variant based on convolutional codes. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 102-117. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7932
, pp. 102-117
-
-
Landais, G.1
Tillich, J.-P.2
-
25
-
-
85034651324
-
An observation on the security of McEliece's publickey cryptosystem
-
Günther, C.G. (ed.) EUROCRYPT 1988. Springer, Heidelberg
-
Lee, P.J., Brickell, E.F.: An observation on the security of McEliece's publickey cryptosystem. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 275-280. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.330
, pp. 275-280
-
-
Lee, P.J.1
Brickell, E.F.2
-
26
-
-
0024078914
-
A probabilistic algorithm for computing minimum weights of large error-correcting codes
-
Leon, J.S.: A probabilistic algorithm for computing minimum weights of large error-correcting codes. IEEE Trans. Inform. Theory 34(5), 1354-1359 (1988)
-
(1988)
IEEE Trans. Inform. Theory
, vol.34
, Issue.5
, pp. 1354-1359
-
-
Leon, J.S.1
-
27
-
-
0035270825
-
Weak keys in the McEliece public-key cryptosystem
-
Loidreau, P., Sendrier, N.: Weak keys in the McEliece public-key cryptosystem. IEEE Trans. Inform. Theory 47(3), 1207-1211 (2001)
-
(2001)
IEEE Trans. Inform. Theory
, vol.47
, Issue.3
, pp. 1207-1211
-
-
Loidreau, P.1
Sendrier, N.2
-
28
-
-
84868307945
-
A new version of mcEliece PKC based on convolutional codes
-
Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. Springer, Heidelberg
-
Löndahl, C., Johansson, T.: A new version of mcEliece PKC based on convolutional codes. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 461-470. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7618
, pp. 461-470
-
-
Löndahl, C.1
Johansson, T.2
-
30
-
-
84901656522
-
Evaluation of public-key cryptosystems based on algebraic geometry codes
-
Borges, J., Villanueva, M. (eds.)
-
Márquez-Corbella, I., Martínez-Moro, E., Pellikaan, R.: Evaluation of public-key cryptosystems based on algebraic geometry codes. In: Borges, J., Villanueva, M. (eds.) Proceedings of the Third International Castle Meeting on Coding Theory and Applications, Barcelona, Spain, September 11-15, pp. 199-204 (2011)
-
(2011)
Proceedings of the Third International Castle Meeting on Coding Theory and Applications, Barcelona, Spain, September 11-15
, pp. 199-204
-
-
Márquez-Corbella, I.1
Martínez-Moro, E.2
Pellikaan, R.3
-
31
-
-
84901655135
-
The non-gap sequence of a subcode of a Generalized Reed-Solomon code
-
Márquez-Corbella, I., Martínez-Moro, E., Pellikaan, R.: The non-gap sequence of a subcode of a Generalized Reed-Solomon code. In: Des. Codes Cryptogr, pp. 1-17 (2012)
-
(2012)
Des. Codes Cryptogr
, pp. 1-17
-
-
Márquez-Corbella, I.1
Martínez-Moro, E.2
Pellikaan, R.3
-
32
-
-
84894636815
-
On the unique representation of very strong algebraic geometry codes
-
in press
-
Márquez-Corbella, I., Martínez-Moro, E., Pellikaan, R.: On the unique representation of very strong algebraic geometry codes. Des. Codes Cryptogr., 1-16 (2012) (in press)
-
(2012)
Des. Codes Cryptogr.
, pp. 1-16
-
-
Márquez-Corbella, I.1
Martínez-Moro, E.2
Pellikaan, R.3
-
34
-
-
82955177030
-
0.054n)
-
Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg
-
0.054n). In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 107-124. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7073
, pp. 107-124
-
-
May, A.1
Meurer, A.2
Thomae, E.3
-
35
-
-
0002448405
-
A Public-Key System Based on Algebraic Coding Theory
-
Jet Propulsion Lab.
-
McEliece, R.J.: A Public-Key System Based on Algebraic Coding Theory. Jet Propulsion Lab., 114-116 (1978), DSN Progress Report 44
-
(1978)
DSN Progress Report
, vol.44
, pp. 114-116
-
-
McEliece, R.J.1
-
36
-
-
38049165687
-
Cryptanalysis of the Sidelnikov Cryptosystem
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Minder, L., Shokrollahi, M.A.: Cryptanalysis of the Sidelnikov Cryptosystem. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 347-360. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 347-360
-
-
Minder, L.1
Shokrollahi, M.A.2
-
37
-
-
84884498151
-
MDPC-McEliece: New McEliece variants from moderate density parity-check codes
-
Misoczki, R., Tillich, J.-P., Sendrier, N., Barreto, P.S.L.M.: MDPC-McEliece: New McEliece variants from moderate density parity-check codes. IACR Cryptology ePrint Archive, 2012:409 (2012)
-
(2012)
IACR Cryptology ePrint Archive
, vol.2012
, pp. 409
-
-
Misoczki, R.1
Tillich, J.-P.2
Sendrier, N.3
Barreto, P.S.L.M.4
-
38
-
-
0022582790
-
Knapsack-type cryptosystems and algebraic coding theory
-
Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory 15(2), 159-166 (1986)
-
(1986)
Problems of Control and Information Theory
, vol.15
, Issue.2
, pp. 159-166
-
-
Niederreiter, H.1
-
39
-
-
77952289695
-
Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes
-
Otmani, A., Tillich, J.-P., Dallot, L.: Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes. Special Issues of Mathematics in Computer Science 3(2), 129-140 (2010)
-
(2010)
Special Issues of Mathematics in Computer Science
, vol.3
, Issue.2
, pp. 129-140
-
-
Otmani, A.1
Tillich, J.-P.2
Dallot, L.3
-
40
-
-
38249008268
-
On decoding by error location and dependent sets of error positions
-
Pellikaan, R.: On decoding by error location and dependent sets of error positions. Discrete Math. 107, 368-381 (1992)
-
(1992)
Discrete Math.
, vol.107
, pp. 368-381
-
-
Pellikaan, R.1
-
41
-
-
77954391096
-
q
-
Sendrier, N. (ed.) PQCrypto 2010. Springer, Heidelberg
-
q. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol. 6061, pp. 81-94. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6061
, pp. 81-94
-
-
Peters, C.1
-
42
-
-
0034226112
-
Finding the permutation between equivalent linear codes: The support splitting algorithm
-
Sendrier, N.: Finding the permutation between equivalent linear codes: The support splitting algorithm. IEEE Trans. Inform. Theory 46(4), 1193-1203 (2000)
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, Issue.4
, pp. 1193-1203
-
-
Sendrier, N.1
-
43
-
-
0027983324
-
A public-key cryptosytem based on Reed-Muller codes
-
Sidelnikov, V.M.: A public-key cryptosytem based on Reed-Muller codes. Discrete Math. Appl. 4(3), 191-207 (1994)
-
(1994)
Discrete Math. Appl.
, vol.4
, Issue.3
, pp. 191-207
-
-
Sidelnikov, V.M.1
-
44
-
-
84929257781
-
On the insecurity of cryptosystems based on generalized Reed-Solomon codes
-
Sidelnikov, V.M., Shestakov, S.O.: On the insecurity of cryptosystems based on generalized Reed-Solomon codes. Discrete Math. Appl. 1(4), 439-444 (1992)
-
(1992)
Discrete Math. Appl.
, vol.1
, Issue.4
, pp. 439-444
-
-
Sidelnikov, V.M.1
Shestakov, S.O.2
-
45
-
-
84964937021
-
A method for finding codewords of small weight
-
Wolfmann, J., Cohen, G. (eds.) Coding Theory 1988. Springer, Heidelberg
-
Stern, J.: A method for finding codewords of small weight. In: Wolfmann, J., Cohen, G. (eds.) Coding Theory 1988. LNCS, vol. 388, pp. 106-113. Springer, Heidelberg (1989)
-
(1989)
LNCS
, vol.388
, pp. 106-113
-
-
Stern, J.1
-
46
-
-
0016996242
-
Further results on Goppa codes and their applications to constructing efficient binary codes
-
Sugiyama, Y., Kasahara, M., Hirasawa, S., Namekawa, T.: Further results on Goppa codes and their applications to constructing efficient binary codes. IEEE Trans. Inform. Theory 22, 518-526 (1976)
-
(1976)
IEEE Trans. Inform. Theory
, vol.22
, pp. 518-526
-
-
Sugiyama, Y.1
Kasahara, M.2
Hirasawa, S.3
Namekawa, T.4
-
47
-
-
39049099966
-
Two NP-complete problems in coding theory with an application in code based cryptography
-
Wieschebrink, C.: Two NP-complete problems in coding theory with an application in code based cryptography. In: 2006 IEEE International Symposium on Information Theory, pp. 1733-1737 (2006)
-
(2006)
2006 IEEE International Symposium on Information Theory
, pp. 1733-1737
-
-
Wieschebrink, C.1
-
48
-
-
77954408355
-
Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes
-
Sendrier, N. (ed.) PQCrypto 2010. Springer, Heidelberg
-
Wieschebrink, C.: Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol. 6061, pp. 61-72. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6061
, pp. 61-72
-
-
Wieschebrink, C.1
|