-
1
-
-
84890891494
-
Optimization of the parity-check matrix density in QC-LDPC code-based McEliece cryptosystems, in Proceedings of the IEEE International Conference on Communications (ICC 2013) - Workshop on Information Security over Noisy and Lossy Communication Systems. (Budapest
-
M. Baldi, M. Bianchi, F. Chiaraluce, Optimization of the parity-check matrix density in QC-LDPC code-based McEliece cryptosystems, in Proceedings of the IEEE International Conference on Communications (ICC 2013) - Workshop on Information Security over Noisy and Lossy Communication Systems. (Budapest, Hungary 2013)
-
(2013)
Hungary
-
-
Baldi, M.1
Bianchi, M.2
Chiaraluce, F.3
-
2
-
-
84883324538
-
Security and complexity of the McEliece Cryptosystem based on QC-LDPC codes. IET Inf
-
M. Baldi, M. Bianchi, F. Chiaraluce, Security and complexity of the McEliece Cryptosystem based on QC-LDPC codes. IET Inf. Secur. 7(3), 212–220 (2013)
-
(2013)
Secur
, vol.7
, Issue.3
, pp. 212-220
-
-
Baldi, M.1
Bianchi, M.2
Chiaraluce, F.3
-
3
-
-
84897387775
-
Improving the efficiency of the LDPC code-based McEliece cryptosystem through irregular codes
-
Split, Croatia
-
M. Baldi, M. Bianchi, N. Maturo, F. Chiaraluce, Improving the efficiency of the LDPC code-based McEliece cryptosystem through irregular codes, in Proceedings of the IEEE Symposium on Computers and Communications (ISCC 2013). (Split, Croatia, 2013)
-
(2013)
Proceedings of the IEEE Symposium on Computers and Communications (ISCC
, vol.2013
-
-
Baldi, M.1
Bianchi, M.2
Maturo, N.3
Chiaraluce, F.4
-
4
-
-
52149114896
-
A new analysis of the McEliece cryptosystem based on QC-LDPC codes, in Security and Cryptography for Networks. LNCS, vol. 5229 (Springer
-
M. Baldi, M. Bodrato, F. Chiaraluce, A new analysis of the McEliece cryptosystem based on QC-LDPC codes, in Security and Cryptography for Networks. LNCS, vol. 5229 (Springer, Berlin/Heidelberg, 2008), pp. 246–262
-
(2008)
Berlin/Heidelberg
, pp. 246-262
-
-
Baldi, M.1
Bodrato, M.2
Chiaraluce, F.3
-
5
-
-
51649105649
-
Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC codes, in Proceedings of the IEEE International Symposium on Information Theory (ISIT 2007) (Nice
-
M. Baldi, F. Chiaraluce, Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC codes, in Proceedings of the IEEE International Symposium on Information Theory (ISIT 2007) (Nice, France, 2007), pp. 2591–2595
-
(2007)
France
, pp. 2591-2595
-
-
Baldi, M.1
Chiaraluce, F.2
-
6
-
-
38549169109
-
Quasi-cyclic low-density parity-check codes in the McEliece cryptosystem, in Proceedings of the IEEE International Conference on Communications (ICC 2007) (Glasgow
-
M. Baldi, F. Chiaraluce, R. Garello, F. Mininni, Quasi-cyclic low-density parity-check codes in the McEliece cryptosystem, in Proceedings of the IEEE International Conference on Communications (ICC 2007) (Glasgow, Scotland, 2007), pp. 951–956
-
(2007)
Scotland
, pp. 951-956
-
-
Baldi, M.1
Chiaraluce, F.2
Garello, R.3
Mininni, F.4
-
7
-
-
84860003018
-
Decoding random binary linear codes in: How 1 + 1 = 0 improves information set decoding, in EUROCRYPT 2012. LNCS, vol
-
A. Becker, A. Joux, A. May, A. Meurer, Decoding random binary linear codes in: How 1 + 1 = 0 improves information set decoding, in EUROCRYPT 2012. LNCS, vol. 7237 (Springer-Verlag 2012), pp. 520–536
-
(2012)
Springer-Verlag
, pp. 520-536
-
-
Becker, A.1
Joux, A.2
May, A.3
Meurer, A.4
-
8
-
-
14844342361
-
-
T.P. Berger, P. Loidreau, How to mask the structure of codes for a cryptographic use. Des. Codes Cryptogr. 35, 63–79 (2005)
-
T.P. Berger, P. Loidreau, How to mask the structure of codes for a cryptographic use. Des. Codes Cryptogr. 35, 63–79 (2005)
-
-
-
-
9
-
-
0017973512
-
-
E. Berlekamp, R. McEliece, H. van Tilborg, On the inherent intractability of certain coding problems. IEEE Trans. Inf. Theory 24(3), 384–386 (1978)
-
E. Berlekamp, R. McEliece, H. van Tilborg, On the inherent intractability of certain coding problems. IEEE Trans. Inf. Theory 24(3), 384–386 (1978)
-
-
-
-
10
-
-
84890623915
-
McBits: fast constant-time code-based cryptography, in Proceedings of the Cryptographic Hardware and Embedded Systems (CHES 2013). LNCS, vol
-
D.J. Bernstein, T. Chou, P. Schwabe, McBits: fast constant-time code-based cryptography, in Proceedings of the Cryptographic Hardware and Embedded Systems (CHES 2013). LNCS, vol. 8086 (Springer, 2013), pp. 250–272
-
(2013)
Springer
, pp. 250-272
-
-
Bernstein, D.J.1
Chou, T.2
Schwabe, P.3
-
11
-
-
56749164782
-
Attacking and defending the McEliece cryptosystem, in Post-Quantum Cryptography. LNCS, vol. 5299 (Springer
-
D.J. Bernstein, T. Lange, C. Peters, Attacking and defending the McEliece cryptosystem, in Post-Quantum Cryptography. LNCS, vol. 5299 (Springer, Berlin/Heidelberg, 2008), pp. 31–46
-
(2008)
Berlin/Heidelberg
, pp. 31-46
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
12
-
-
80052013042
-
Smaller decoding exponents: ball-collision decoding, in CRYPTO 2011. LNCS, vol
-
D.J. Bernstein, T. Lange, C. Peters, Smaller decoding exponents: ball-collision decoding, in CRYPTO 2011. LNCS, vol. 6841 (Springer-Verlag, 2011), pp. 743–760
-
(2011)
Springer-Verlag
, pp. 743-760
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
13
-
-
82955186254
-
Wild McEliece incognito
-
D.J. Bernstein, T. Lange, C. Peters, Wild McEliece incognito. In: B.-Y. Yang (ed.) Post-Quantum Cryptography: PQCrypto 2011. LNCS, vol. 7071 (Springer 2011), pp. 244–254
-
(2011)
Post-Quantum Cryptography: PQCrypto 2011. LNCS, vol. 7071 (Springer
, pp. 244-254
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
Yang, B.-Y.4
-
15
-
-
47649112427
-
Complexity analysis of Reed-Solomon decoding over without using syndromes. EURASIP J. Wirel. Commun. Netw
-
N. Chen, Z. Yan, Complexity analysis of Reed-Solomon decoding over without using syndromes. EURASIP J. Wirel. Commun. Netw. Article ID 843634 (2008)
-
(2008)
Article ID 843634
-
-
Chen, N.1
Yan, Z.2
-
16
-
-
84929461941
-
ASIACRYPT
-
N. Courtois, M. Finiasz, N. Sendrier, How to achieve a McEliece-based digital signature scheme, in ASIACRYPT 2001. LNCS, vol. 2248 (Springer, Berlin/Heidelberg, 2001), pp. 157–174
-
(2001)
LNCS
, vol.2248
, Issue.Springer, Berlin/Heidelberg, 2001
, pp. 157-174
-
-
Courtois, N.1
Finiasz, M.2
Sendrier, N.3
-
17
-
-
84905217777
-
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes. Des
-
A. Couvreur, P. Gaborit, V. Gauthier-Umaña, A. Otmani, J.-P. Tillich, Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes. Des. Codes Cryptogr. (2014). doi:10.1007/s10623-014-9967-z
-
(2014)
Codes Cryptogr
-
-
Couvreur, A.1
Gaborit, P.2
Gauthier-Umaña, V.3
Otmani, A.4
Tillich, J.-P.5
-
18
-
-
84866481430
-
-
N. Döttling, R. Dowsley, J. Müller-Quade, A.C.A Nascimento, A CCA2 Secure Variant of the McEliece Cryptosystem. IEEE Trans. Inf. Theory 58(10), 6672–6680 (2012)
-
N. Döttling, R. Dowsley, J. Müller-Quade, A.C.A Nascimento, A CCA2 Secure Variant of the McEliece Cryptosystem. IEEE Trans. Inf. Theory 58(10), 6672–6680 (2012)
-
-
-
-
19
-
-
67650102558
-
A CCA2 secure public key encryption scheme based on the McEliece assumptions in the standard model, in Topics in Cryptology - CT-RSA
-
R. Dowsley, J. Müller-Quade, A.C.A. Nascimento, A CCA2 secure public key encryption scheme based on the McEliece assumptions in the standard model, in Topics in Cryptology - CT-RSA 2009. LNCS, vol. 5473 (Springer, Berlin/Heidelberg, 2009), pp. 240–251
-
(2009)
LNCS
, vol.5473
, Issue.Springer, Berlin/Heidelberg, 2009
, pp. 240-251
-
-
Dowsley, R.1
Müller-Quade, J.2
Nascimento, A.C.A.3
-
20
-
-
84870872249
-
-
M. Elia, J. Rosenthal, D. Schipani, Polynomial evaluation over finite fields: new algorithms and complexity bounds. Appl. Algebra Eng. Commun. Comput. 23(3–4), 129–141 (2011)
-
M. Elia, J. Rosenthal, D. Schipani, Polynomial evaluation over finite fields: new algorithms and complexity bounds. Appl. Algebra Eng. Commun. Comput. 23(3–4), 129–141 (2011)
-
-
-
-
21
-
-
83655202691
-
A distinguisher for high rate McEliece cryptosystems, in Proceedings of the IEEE Information Theory Workshop (ITW 2011). (Paraty
-
J.-C. Faugère, A. Otmani, L. Perret, J.-P. Tillich, A distinguisher for high rate McEliece cryptosystems, in Proceedings of the IEEE Information Theory Workshop (ITW 2011). (Paraty, Brazil, 2011), pp. 282–286
-
(2011)
Brazil
, pp. 282-286
-
-
Faugère, J.-C.1
Otmani, A.2
Perret, L.3
Tillich, J.-P.4
-
22
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes, in CRYPTO ’99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology. LNCS, vol
-
E. Fujisaki, T. Okamoto, Secure integration of asymmetric and symmetric encryption schemes, in CRYPTO ’99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology. LNCS, vol. 6110 (Springer-Verlag 1999), pp. 537–554
-
(1999)
Springer-Verlag
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
23
-
-
84935622001
-
LNCS, vol
-
E.M. Gabidulin, A.V. Paramonov, O.V. Tretjakov, Ideals over a non-commutative ring and their application in cryptography, in D.W. Davies (ed.) Advances in Cryptology - EUROCRYPT 91. LNCS, vol. 547 (Springer Verlag, 1991)
-
(1991)
Springer Verlag
-
-
Gabidulin, E.M.1
Paramonov, A.V.2
Tretjakov, O.V.3
-
24
-
-
84911134920
-
-
E.M. Gabidulin, O. Kjelsen, How to avoid the Sidelnikov-Shestakov attack, in Error Control, Cryptology, and Speech Compression. LNCS, vol. 829 (Springer, Berlin/Heidelberg 1994), pp. 25–32
-
E.M. Gabidulin, O. Kjelsen, How to avoid the Sidelnikov-Shestakov attack, in Error Control, Cryptology, and Speech Compression. LNCS, vol. 829 (Springer, Berlin/Heidelberg 1994), pp. 25–32
-
-
-
-
25
-
-
84955341192
-
-
V. Gauthier-Umaña, A. Otmani, J.-P. Tillich, A distinguisher-based attack on a variant of McEliece’s cryptosystem based on Reed-Solomon codes
-
V. Gauthier-Umaña, A. Otmani, J.-P. Tillich, A distinguisher-based attack on a variant of McEliece’s cryptosystem based on Reed-Solomon codes. http://arxiv.org/abs/1204.6459
-
-
-
-
26
-
-
84924913965
-
A non asymptotic analysis of information set decoding. Cryptology ePrint Archive
-
Y. Hamdaoui, N. Sendrier, A non asymptotic analysis of information set decoding. Cryptology ePrint Archive, Report 2013/162 (2013)
-
(2013)
Report
, vol.2013
-
-
Hamdaoui, Y.1
Sendrier, N.2
-
27
-
-
84889341039
-
-
G. Kabatiansky, E. Krouk, S. Semenov, Error Correcting Coding and Security for Data Networks: Analysis of the Superchannel Concept. (Wiley, 2005)
-
G. Kabatiansky, E. Krouk, S. Semenov, Error Correcting Coding and Security for Data Networks: Analysis of the Superchannel Concept. (Wiley, 2005)
-
-
-
-
28
-
-
84937393537
-
Semantically secure McEliece public-key cryptosystems - conversions for McEliece PKC
-
K. Kobara, H. Imai, Semantically secure McEliece public-key cryptosystems - conversions for McEliece PKC. In: K. Kwangjo, (ed.) Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2001). LNCS, vol. 1992 (Springer, 2001), pp. 19–35
-
(2001)
Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2001). LNCS, vol. 1992 (Springer
, pp. 19-35
-
-
Kobara, K.1
Imai, H.2
Kwangjo, K.3
-
29
-
-
84955364778
-
-
I. Marquez-Corbella, R. Pellikaan, Error-correcting pairs for a public-key cryptosystem, in Proceedings of the Code-based Cryptography Workshop (CBC 2012) (Lyngby, Denmark, 2012)
-
I. Marquez-Corbella, R. Pellikaan, Error-correcting pairs for a public-key cryptosystem, in Proceedings of the Code-based Cryptography Workshop (CBC 2012) (Lyngby, Denmark, 2012)
-
-
-
-
30
-
-
82955177030
-
Decoding random linear codes in O(20.054n), in ASIACRYPT
-
A. May, A., Meurer, E. Thomae, Decoding random linear codes in O(20.054n), in ASIACRYPT 2011. LNCS, vol. 7073 (Springer-Verlag, 2011), pp. 107–124
-
(2011)
LNCS
, vol.7073
, Issue.Springer-Verlag, 2011
, pp. 107-124
-
-
May, A.1
-
31
-
-
0002448405
-
A public-key cryptosystem based on algebraic coding theory
-
R.J. McEliece, A public-key cryptosystem based on algebraic coding theory. DSN Progress Report, 114–116 (1978)
-
(1978)
DSN Progress Report
, pp. 114-116
-
-
McEliece, R.J.1
-
32
-
-
84955421686
-
-
L. Minder, Cryptography based on error correcting codes. Ph.D. thesis, École Polytechnique Fédérale de Lausanne (2007)
-
L. Minder, Cryptography based on error correcting codes. Ph.D. thesis, École Polytechnique Fédérale de Lausanne (2007)
-
-
-
-
33
-
-
84884498151
-
MDPC-McEliece: New McEliece variants from moderate density parity-check codes. Cryptology ePrint Archive
-
R. Misoczki, J.-P. Tillich, N. Sendrier, P.S.L.M. Barreto, MDPC-McEliece: New McEliece variants from moderate density parity-check codes. Cryptology ePrint Archive, Report 2012/409 (2012)
-
(2012)
Report
, vol.2012
-
-
Misoczki, R.1
Tillich, J.-P.2
Sendrier, N.3
Barreto, P.S.L.M.4
-
34
-
-
0034448183
-
Using low density parity check codes in the McEliece cryptosystem, in Proceedings of the IEEE International Symposium on Information Theory (ISIT 2000) (Sorrento
-
C. Monico, J. Rosenthal, A. Shokrollahi, Using low density parity check codes in the McEliece cryptosystem, in Proceedings of the IEEE International Symposium on Information Theory (ISIT 2000) (Sorrento, Italy, 2000), p. 215
-
(2000)
Italy
, pp. 215
-
-
Monico, C.1
Rosenthal, J.2
Shokrollahi, A.3
-
35
-
-
0022582790
-
-
H. Niederreiter, Knapsack-type cryptosystems and algebraic coding theory. Probl. Contr. Inf. Theory 15, 159–166 (1986)
-
(1986)
Theory
, vol.15
, pp. 159-166
-
-
Niederreiter, H.1
-
36
-
-
72449164289
-
Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes
-
Beijing, China
-
A. Otmani, J.P. Tillich, L. Dallot, Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes, in Proceedings of the First International Conference on Symbolic Computation and Cryptography (SCC 2008) (Beijing, China, 2008)
-
(2008)
Proceedings of the First International Conference on Symbolic Computation and Cryptography (SCC)
, vol.2008
-
-
Otmani, A.1
Tillich, J.P.2
Dallot, L.3
-
37
-
-
0038060507
-
-
A. Ourivski, E.M. Gabidulin, Column scrambler for the GPT cryptosystem. Discret. Appl. Math. 128, 207–221 (2003)
-
A. Ourivski, E.M. Gabidulin, Column scrambler for the GPT cryptosystem. Discret. Appl. Math. 128, 207–221 (2003)
-
-
-
-
38
-
-
43249125012
-
-
R. Overbeck, Structural attacks for public key cryptosystems based on Gabidulin codes. J. Cryptol. 21(2), 280–301 (2008)
-
R. Overbeck, Structural attacks for public key cryptosystems based on Gabidulin codes. J. Cryptol. 21(2), 280–301 (2008)
-
-
-
-
39
-
-
85055706395
-
On a CCA2-secure variant of McEliece in the standard model. Cryptology ePrint Archive
-
E. Persichetti, On a CCA2-secure variant of McEliece in the standard model. Cryptology ePrint Archive, Report 2012/268 (2012)
-
(2012)
Report
, vol.2012
-
-
Persichetti, E.1
-
40
-
-
77954391096
-
Information-set decoding for linear codes over Fq, in N. Sendrier (ed.) Post-Quantum Cryptography. LNCS, vol. 6061 (Springer
-
C. Peters, Information-set decoding for linear codes over Fq, in N. Sendrier (ed.) Post-Quantum Cryptography. LNCS, vol. 6061 (Springer, Berlin/Heidelberg, 2010), pp. 81–94
-
Berlin/Heidelberg
, vol.2010
, pp. 81-94
-
-
Peters, C.1
-
41
-
-
84955387997
-
-
C. Peters, (2010)
-
C. Peters, (2010), http://christianepeters.wordpress.com/publications/tools/
-
-
-
-
42
-
-
84864818403
-
An efficient IND-CCA2 secure variant of the Niederreiter encryption scheme in the standard model, in Information Security and Privacy. LNCS, vol
-
K. Preetha Mathew, S. Vasant, S., Venkatesan, C. Pandu Rangan, An efficient IND-CCA2 secure variant of the Niederreiter encryption scheme in the standard model, in Information Security and Privacy. LNCS, vol. 7372 (Springer-Verlag, 2012), pp. 166–179
-
(2012)
Springer-Verlag
, pp. 166-179
-
-
Preetha Mathew, K.1
Vasant, S.2
-
43
-
-
79960387857
-
-
H. Rashwan, E.M. Gabidulin, B. Honary, Security of the GPT cryptosystem and its applications to cryptography. Secur. Commun. Netw. 4(8), 937–946 (2011)
-
H. Rashwan, E.M. Gabidulin, B. Honary, Security of the GPT cryptosystem and its applications to cryptography. Secur. Commun. Netw. 4(8), 937–946 (2011)
-
-
-
-
44
-
-
84955330265
-
CCA2-secure variant of the McEliece cryptosystem in the standard model. Cryptology ePrint Archive
-
R. Rastaghi, An efficient CCA2-secure variant of the McEliece cryptosystem in the standard model. Cryptology ePrint Archive, Report 2013/040 (2013)
-
(2013)
Report
, vol.2013
-
-
Rastaghi, R.1
-
45
-
-
80054811885
-
On the decoding complexity of cyclic codes up to the BCH bound, in Proceedings of the IEEE International Symposium on Information Theory (ISIT 2011) (Saint Petersburg
-
D. Schipani, M. Elia, J. Rosenthal, On the decoding complexity of cyclic codes up to the BCH bound, in Proceedings of the IEEE International Symposium on Information Theory (ISIT 2011) (Saint Petersburg, Russia, 2011), pp. 835–839
-
(2011)
Russia
, pp. 835-839
-
-
Schipani, D.1
Elia, M.2
Rosenthal, J.3
-
46
-
-
84929257781
-
On insecurity of cryptosystems based on generalized Reed-Solomon codes, Discret
-
V.M Sidelnikov, S.O. Shestakov, On insecurity of cryptosystems based on generalized Reed-Solomon codes, Discret. Math. Appl. 2(4), 439–444 (1992)
-
(1992)
Math. Appl
, vol.2
, Issue.4
, pp. 439-444
-
-
Sidelnikov, V.M.1
Shestakov, S.O.2
-
47
-
-
84866980464
-
Practical key recovery attacks on two McEliece variants, in C. Cid, J.C. Faugère, (eds.) Proceeedings of the 2nd International Conference on Symbolic Computation and Cryptography, (Egham
-
V.G. Umana, G. Leander, Practical key recovery attacks on two McEliece variants, in C. Cid, J.C. Faugère, (eds.) Proceeedings of the 2nd International Conference on Symbolic Computation and Cryptography, (Egham, UK, 2010), pp. 27–44
-
UK
, vol.2010
, pp. 27-44
-
-
Umana, V.G.1
Leander, G.2
|