-
1
-
-
84905884450
-
-
ArXiv:1108.2462v2 Submitted
-
Baldi M., Bianchi M., Chiaraluce F., Rosenthal J., Schipani D.: Enhanced public key security for the McEliece cryptosystem. ArXiv:1108.2462v2 (2011, Submitted).
-
(2011)
Enhanced Public Key Security for the McEliece Cryptosystem
-
-
Baldi, M.1
Bianchi, M.2
Chiaraluce, F.3
Rosenthal, J.4
Schipani, D.5
-
2
-
-
84905884450
-
-
ArXiv:1108.2462v3 Submitted
-
Baldi M., Bianchi M., Chiaraluce F., Rosenthal J., Schipani D.: Enhanced public key security for the McEliece cryptosystem. ArXiv:1108.2462v3 (2012, Submitted).
-
(2012)
Enhanced Public Key Security for the McEliece Cryptosystem
-
-
Baldi, M.1
Bianchi, M.2
Chiaraluce, F.3
Rosenthal, J.4
Schipani, D.5
-
3
-
-
14844342361
-
How to mask the structure of codes for a cryptographic use
-
Berger T.P., Loidreau P.: How to mask the structure of codes for a cryptographic use. Des. Codes Cryptogr. 35(1), 63-79 (2005).
-
(2005)
Des. Codes Cryptogr
, vol.35
, Issue.1
, pp. 63-79
-
-
Berger, T.P.1
Loidreau, P.2
-
5
-
-
84905265658
-
-
ArXiv:1111.4301. This paper was accepted for publication in the proceedings of the 44th ACM Symposium on Theory of Computing (STOC). The authors withdrew their paper after they learned that their scheme was threatened
-
Bogdanov A., Lee C.H.: Homomorphic encryption from codes. ArXiv:1111.4301. This paper was accepted for publication in the proceedings of the 44th ACM Symposium on Theory of Computing (STOC). The authors withdrew their paper after they learned that their scheme was threatened (2011).
-
(2011)
Homomorphic Encryption from Codes
-
-
Bogdanov, A.1
Lee, C.H.2
-
7
-
-
84873940575
-
When homomorphism becomes a liability
-
Brakerski Z.: When homomorphism becomes a liability. In: TCC, pp. 143-161 (2013).
-
(2013)
TCC
, pp. 143-161
-
-
Brakerski, Z.1
-
8
-
-
70350343371
-
Asymptotically good ideal linear secret sharing with strong multiplication over any fixed finite field
-
Halevi S. (ed.) Springer, Berlin
-
Cascudo I., Chen H., Cramer R., Xing C.: Asymptotically good ideal linear secret sharing with strong multiplication over any fixed finite field. In: Halevi S. (ed.) Advances in Cryptology: CRYPTO 2009. Lecture Notes in Computer Science, vol. 5677, pp. 466-486. Springer, Berlin (2009).
-
(2009)
Advances in Cryptology: CRYPTO 2009. Lecture Notes in Computer Science
, vol.5677
, pp. 466-486
-
-
Cascudo, I.1
Chen, H.2
Cramer, R.3
Xing, C.4
-
9
-
-
80051980228
-
The torsion-limit for algebraic function fields and its application to arithmetic secret sharing
-
Rogaway P. (ed.) Springer, Berlin
-
Cascudo I., Cramer R., Xing C.: The torsion-limit for algebraic function fields and its application to arithmetic secret sharing. In: Rogaway P. (ed.) Advances in Cryptology: CRYPTO 2011. Lecture Notes in Computer Science, vol. 6841, pp. 685-705. Springer, Berlin (2011).
-
(2011)
Advances in Cryptology: CRYPTO 2011. Lecture Notes in Computer Science
, vol.6841
, pp. 685-705
-
-
Cascudo, I.1
Cramer, R.2
Xing, C.3
-
11
-
-
84916596072
-
Polynomial time attack on wild McEliece over quadratic extensions
-
(To appear)
-
Couvreur A., Otmani A., Tillich J.P.: Polynomial time attack on wild McEliece over quadratic extensions. In: EUROCRYPT (2014) (To appear).
-
(2014)
Eurocrypt
-
-
Couvreur, A.1
Otmani, A.2
Tillich, J.P.3
-
12
-
-
83655202691
-
A distinguisher for high rate McEliece cryptosystems
-
ITW 2011, Paraty, Brasil
-
Faugère J.-C., Gauthier V., Otmani A., Perret L., Tillich J.-P.: A distinguisher for high rate McEliece cryptosystems. In: Proceedings of the Information Theory Workshop 2011, ITW 2011, Paraty, Brasil, pp. 282-286 (2011).
-
(2011)
Proceedings of the Information Theory Workshop 2011
, pp. 282-286
-
-
Faugère, J.-C.1
-
13
-
-
84884481641
-
A distinguisher for high-rate McEliece cryptosystems
-
Faugère J.-C., Gauthier-Umaña V., Otmani A., Perret L., Tillich J.-P.: A distinguisher for high-rate McEliece cryptosystems. IEEE Trans. Inf. Theory, 59(10), 6830-6844 (2013).
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.10
, pp. 6830-6844
-
-
Faugère, J.-C.1
-
16
-
-
25444433745
-
Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem
-
Davies D. (ed.) Springer, Berlin
-
Gibson J.: Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem. In: Davies D. (ed.) Advances in Cryptology: EUROCRYPT 91. Lecture Notes in Computer Science, vol. 547, pp. 517-521. Springer, Berlin (1991).
-
(1991)
Advances in Cryptology: EUROCRYPT 91. Lecture Notes in Computer Science
, vol.547
, pp. 517-521
-
-
Gibson, J.1
-
18
-
-
0003197258
-
A unified description of an error locating procedure for linear codes
-
Voneshta Voda
-
Kötter R.: A unified description of an error locating procedure for linear codes. In: Proceedings of the Algebraic and Combinatorial Coding Theory, Voneshta Voda, pp. 113-117 (1992).
-
(1992)
Proceedings of the Algebraic and Combinatorial Coding Theory
, pp. 113-117
-
-
Kötter, R.1
-
19
-
-
0035270825
-
Weak keys in the McEliece public-key cryptosystem
-
Loidreau P., Sendrier N.: Weak keys in the McEliece public-key cryptosystem. IEEE Trans. Inf. Theory 47(3), 1207-1211 (2001).
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.3
, pp. 1207-1211
-
-
Loidreau, P.1
Sendrier, N.2
-
20
-
-
84901656522
-
Evaluation of public-key cryptosystems based on algebraic geometry codes
-
Borges J., Villanueva M. (eds.) Barcelona
-
Márquez-Corbella I., Martínez-Moro E., Pellikaan R.: Evaluation of public-key cryptosystems based on algebraic geometry codes. In: Borges J., Villanueva M. (eds.) Proceedings of the Third International Castle Meeting on Coding Theory and Applications, Barcelona, pp. 199-204 (2011).
-
(2011)
Proceedings of the Third International Castle Meeting on Coding Theory and Applications
, pp. 199-204
-
-
Márquez-Corbella, I.1
-
21
-
-
84905278896
-
The non-gap sequence of a subcode of a generalized Reed-Solomon code
-
Finiasz M., Sendrier N., Charpin P., Otmani A. (eds.) Paris
-
Márquez-Corbella I., Martínez-Moro E., Pellikaan R.: The non-gap sequence of a subcode of a generalized Reed-Solomon code. In: Finiasz M., Sendrier N., Charpin P., Otmani A. (eds.) Proceedings of the 7th International Workshop on Coding and Cryptography WCC 2011, Paris, pp. 183-193 (2011).
-
(2011)
Proceedings of the 7th International Workshop on Coding and Cryptography WCC 2011
, pp. 183-193
-
-
Márquez-Corbella, I.1
-
22
-
-
84872377040
-
The non-gap sequence of a subcode of a generalized Reed-Solomon code
-
Márquez-Corbella I., Martínez-Moro E., Pellikaan R.: The non-gap sequence of a subcode of a generalized Reed-Solomon code. Des. Codes Cryptogr. 66, 1-17 (2012).
-
(2012)
Des. Codes Cryptogr
, vol.66
, pp. 1-17
-
-
Márquez-Corbella, I.1
-
23
-
-
84894636815
-
On the unique representation of very strong algebraic geometry codes
-
Márquez-Corbella, I., Martínez-Moro, E., Pellikaan, R.: On the unique representation of very strong algebraic geometry codes. Des. Codes Cryptogr. 70, 1-16 (2012).
-
(2012)
Des. Codes Cryptogr
, vol.70
, pp. 1-16
-
-
Márquez-Corbella, I.1
Martínez-Moro, E.2
Pellikaan, R.3
-
26
-
-
0002448405
-
A public-key system based on algebraic coding theory
-
McEliece R.J.: A public-key system based on algebraic coding theory, pp. 114-116. Jet Propulsion Lab, DSN Progress, Report 44 (1978).
-
(1978)
Jet Propulsion Lab, DSN Progress, Report
, vol.44
, pp. 114-116
-
-
McEliece, R.J.1
-
28
-
-
0022582790
-
Knapsack-type cryptosystems and algebraic coding theory
-
Niederreiter H.: Knapsack-type cryptosystems and algebraic coding theory. Probl. Control Inf. Theory 15(2), 159-166 (1986).
-
(1986)
Probl. Control Inf. Theory
, vol.15
, Issue.2
, pp. 159-166
-
-
Niederreiter, H.1
-
29
-
-
38249008268
-
On decoding by error location and dependent sets of error positions
-
Pellikaan R.: On decoding by error location and dependent sets of error positions. Discret. Math. 106-107, 368-381 (1992).
-
(1992)
Discret. Math
, vol.106-107
, pp. 368-381
-
-
Pellikaan, R.1
-
30
-
-
0027983324
-
A public-key cryptosystem based on Reed-Muller codes
-
Sidelnikov V.M.: A public-key cryptosystem based on Reed-Muller codes. Discret. Math. Appl. 4(3), 191-207 (1994).
-
(1994)
Discret. Math. Appl
, vol.4
, Issue.3
, pp. 191-207
-
-
Sidelnikov, V.M.1
-
31
-
-
84929257781
-
On the insecurity of cryptosystems based on generalized Reed-Solomon codes
-
Sidelnikov V.M., Shestakov S.O.: On the insecurity of cryptosystems based on generalized Reed-Solomon codes. Discret. Math. Appl. 1(4), 439-444 (1992).
-
(1992)
Discret. Math. Appl
, vol.1
, Issue.4
, pp. 439-444
-
-
Sidelnikov, V.M.1
Shestakov, S.O.2
-
32
-
-
39049099966
-
Two NP-complete problems in coding theory with an application in code based cryptography
-
Wieschebrink C.: Two NP-complete problems in coding theory with an application in code based cryptography. In: IEEE International Symposium on Information Theory, pp. 1733-1737 (2006).
-
(2006)
IEEE International Symposium on Information Theory
, pp. 1733-1737
-
-
Wieschebrink, C.1
-
33
-
-
77954408355
-
Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes
-
Sendrier N. (ed.) Springer, Darmstadt
-
Wieschebrink C.: Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes. In: Sendrier N. (ed.) Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010. Lecture Notes in Computer Science, vol. 6061, pp. 61-72. Springer, Darmstadt (2010).
-
(2010)
Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010. Lecture Notes in Computer Science
, vol.6061
, pp. 61-72
-
-
Wieschebrink, C.1
|