메뉴 건너뛰기




Volumn 1514, Issue , 1998, Pages 200-213

Improving the security of the McEliece public-key cryptosystem

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 84947733218     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-49649-1_17     Document Type: Conference Paper
Times cited : (10)

References (25)
  • 1
    • 80052017185 scopus 로고
    • Security-Related Comments Regarding McEliece's Public-Key Cryptosystem
    • Adams, C., and Meijer, H., „Security-Related Comments Regarding McEliece's Public-Key Cryptosystem," Advances in Cryptology-CRYPTO'87, Lecture notes in computer science (Springer-Verlag), pp. 224-228, 1988.
    • (1988) Advances in Cryptology-Crypto'87 , pp. 224-228
    • Adams, C.1    Meijer, H.2
  • 2
    • 0024627373 scopus 로고
    • Security-Related Comments Regarding McEliece's Public-Key Cryptosystem
    • Adams, C., and Meijer, H., „Security-Related Comments Regarding McEliece's Public-Key Cryptosystem," IEEE Transactions on Information Theory, Vol. 35, pp. 454-455, 1989.
    • (1989) IEEE Transactions on Information Theory , vol.35 , pp. 454-455
    • Adams, C.1    Meijer, H.2
  • 3
    • 84945119254 scopus 로고
    • Optimal asymmetric encryption
    • Lecture notes in computer science 950 (Springer-Verlag)
    • Bellare, M., and Rogaway, P., „Optimal asymmetric encryption," Advances in Cryptology-EUROCRYPT'94, Lecture notes in computer science 950 (Springer-Verlag), pp. 232-249, 1994.
    • (1994) Advances in Cryptology-Eurocrypt'94 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 84958666890 scopus 로고    scopus 로고
    • Failure of the McEliece Public-Key Cryptosystem under Message-resend and Related-message Attack
    • Lecture notes in computer science (Springer-Verlag)
    • Berson, T.A., "Failure of the McEliece Public-Key Cryptosystem under Message-resend and Related-message Attack,,, Advances in Cryptology-CRYPTO'97, Lecture notes in computer science (Springer-Verlag), pp. 213-220, 1997.
    • (1997) Advances in Cryptology-Crypto'97 , pp. 213-220
    • Berson, T.A.1
  • 6
    • 84949995981 scopus 로고
    • An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information
    • Lecture notes in computer science (Springer-Verlag)
    • Blum, M., and Goldwasser, S., „An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information," Advances in Cryptology-CRYPTO'84, Lecture notes in computer science (Springer-Verlag), pp. 289-299, 1985..
    • (1985) Advances in Cryptology-Crypto'84 , pp. 289-299
    • Blum, M.1    Goldwasser, S.2
  • 7
    • 0024012468 scopus 로고
    • Cryptanalysis: A Survey of Recent Results
    • Brickell, E.F., and Odlyzko, A., „Cryptanalysis: A Survey of Recent Results," Proc.IEEE, 76, (5), pp. 153-165, 1988.
    • (1988) " Proc.Ieee , vol.76 , Issue.5 , pp. 153-165
    • Brickell, E.F.1    Odlyzko, A.2
  • 8
    • 84874800178 scopus 로고
    • A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • ElGamal, T., „A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans., IT-31, (4), pp. 469-472, 1985.
    • (1985) IEEE Trans , vol.IT-31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 13
    • 84969335380 scopus 로고
    • Cryptanalysis of McEliece's Public-Key Cryptosystem
    • Lecture notes in computer science (Springer-Verlag)
    • Korzhik, V.I., and Turkin, A.I., „Cryptanalysis of McEliece's Public-Key Cryptosystem", Advances in Cryptology-EUROCRYPT'91, Lecture notes in computer science (Springer-Verlag), pp. 68-70, 1991.
    • (1991) Advances in Cryptology-Eurocrypt'91 , pp. 68-70
    • Korzhik, V.I.1    Turkin, A.I.2
  • 14
    • 85034651324 scopus 로고
    • An observation on the security of McEliece's Public-Key Cryptosystem
    • Lecture notes in computer science (Springer-Verlag)
    • Lee, P.J., and Brickell, E.F., „An observation on the security of McEliece's Public-Key Cryptosystem," Advances in Cryptology-EUROCRYPT'88, Lecture notes in computer science (Springer-Verlag), pp. 275-280, 1988.
    • (1988) Advances in Cryptology-Eurocrypt'88 , pp. 275-280
    • Lee, P.J.1    Brickell, E.F.2
  • 15
    • 0025699575 scopus 로고
    • Information Rate of McEliece's Public-Key Cryptosystem
    • Lin, M.C., and Fu, H.L., „Information Rate of McEliece's Public-Key Cryptosystem," Electronics Letters, Vol. 26, No. 1, pp. 16-18, 1990.
    • (1990) Electronics Letters , vol.26 , Issue.1 , pp. 16-18
    • Lin, M.C.1    Fu, H.L.2
  • 16
    • 0002448405 scopus 로고
    • A Public-Key Cryptosystem Based on Algebraic Coding Theory
    • McEliece, R.J., „A Public-Key Cryptosystem Based on Algebraic Coding Theory," DSN Progress Report, 42-44, pp. 114-116, 1978.
    • (1978) DSN Progress Report , vol.42-44 , pp. 114-116
    • McEliece, R.J.1
  • 17
    • 77956030789 scopus 로고
    • NBS FIPS PUB 46, „Data Encryption Standard
    • U.S. Department of Commerce, Jan
    • National Bureau of Standards, NBS FIPS PUB 46, „Data Encryption Standard," National Bureau of Standards, U.S. Department of Commerce, Jan 1977.
    • (1977) National Bureau of Standards
  • 18
    • 0024752648 scopus 로고
    • Improving Code Rate of McEliece's public-Key Cryptosystem
    • Park, C.S., „Improving Code Rate of McEliece's public-Key Cryptosystem," Electronics Letters, Vol. 25, No. 21, pp. 1466-1467, 1989.
    • (1989) Electronics Letters , vol.25 , Issue.21 , pp. 1466-1467
    • Park, C.S.1
  • 19
    • 0003614758 scopus 로고
    • Digital Signatures and Public-Key Functions as Intractable as Factorization
    • Technical Report, MIT/LCS/, Jan
    • Rabin, M.O., „Digital Signatures and Public-Key Functions as Intractable as Factorization," MIT Lab. For Computer Science, Technical Report, MIT/LCS/TR-212, Jan 1979.
    • (1979) MIT Lab. For Computer Science , vol.TR-212
    • Rabin, M.O.1
  • 21
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • Rivest, R.L., Shamir, A., and Adleman, L.M., „A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, 21, (2), pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 23
    • 84455184676 scopus 로고
    • „Efficient Generation of Binary Words of Given Weight
    • (Springer-Verlag)
    • Sendrier, N., „Efficient Generation of Binary Words of Given Weight," Cryptography and Coding: 5th IMA Conference, (Springer-Verlag), pp. 184-187, 1995.
    • (1995) Cryptography and Coding: 5Th IMA Conference , pp. 184-187
    • Sendrier, N.1
  • 24
    • 38149145758 scopus 로고
    • Key Generation of Algebraic-Code Cryptosystems
    • Sun, H.M., and Hwang, T., „Key Generation of Algebraic-Code Cryptosystems", Computers and Mathematics with Applications, 27, (2), pp. 99-106, 1994.
    • (1994) Computers and Mathematics with Applications , vol.27 , Issue.2 , pp. 99-106
    • Sun, H.M.1    Hwang, T.2
  • 25
    • 85031802472 scopus 로고
    • On the McEliece Public-Key Cryptosystem
    • Lecture notes in computer science (Springer-Verlag)
    • van Tilburg, J., „On the McEliece Public-Key Cryptosystem," Advances in Cryptology-CRYPTO'88, Lecture notes in computer science (Springer-Verlag), pp. 119-131, 1990.
    • (1990) Advances in Cryptology-Crypto'88 , pp. 119-131
    • Van Tilburg, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.