메뉴 건너뛰기




Volumn 11192 LNCS, Issue , 2018, Pages 165-181

On the CCA2 security of McEliece in the standard model

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 85055706395     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-030-01446-9_10     Document Type: Conference Paper
Times cited : (17)

References (19)
  • 1
    • 56749156338 scopus 로고    scopus 로고
    • McEliece cryptosystem implementation: Theory and practice
    • Buchmann, J., Ding, J. (eds.), Springer, Heidelberg
    • Biswas, B., Sendrier, N.: McEliece cryptosystem implementation: theory and practice. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 47–62. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-88403-3 4
    • (2008) Pqcrypto 2008. LNCS , vol.5299 , pp. 47-62
    • Biswas, B.1    Sendrier, N.2
  • 3
    • 67650102558 scopus 로고    scopus 로고
    • A CCA2 secure public key encryption scheme based on the mceliece assumptions in the standard model
    • Fischlin, M. (ed.), Springer, Heidelberg
    • Dowsley, R., Müller-Quade, J., Nascimento, A.C.A.: A CCA2 secure public key encryption scheme based on the mceliece assumptions in the standard model. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 240–251. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00862-7 16
    • (2009) CT-RSA 2009. LNCS , vol.5473 , pp. 240-251
    • Dowsley, R.1    Müller-Quade, J.2    Nascimento, A.C.A.3
  • 5
    • 84947905764 scopus 로고    scopus 로고
    • An efficient pseudo-random generator provably as secure as syndrome decoding
    • Maurer, U. (ed.), Springer, Heidelberg
    • Fischer, J.-B., Stern, J.: An efficient pseudo-random generator provably as secure as syndrome decoding. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 245–255. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68339-9 22
    • (1996) EUROCRYPT 1996. LNCS , vol.1070 , pp. 245-255
    • Fischer, J.-B.1    Stern, J.2
  • 6
    • 79955545739 scopus 로고    scopus 로고
    • More constructions of lossy and correlation-secure trapdoor functions
    • Nguyen, P.Q., Pointcheval, D. (eds.), Springer, Heidelberg
    • Freeman, D.M., Goldreich, O., Kiltz, E., Rosen, A., Segev, G.: More constructions of lossy and correlation-secure trapdoor functions. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 279–295. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13013-7 17
    • (2010) PKC 2010. LNCS , vol.6056 , pp. 279-295
    • Freeman, D.M.1    Goldreich, O.2    Kiltz, E.3    Rosen, A.4    Segev, G.5
  • 7
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Wiener, M. (ed.), Springer, Heidelberg
    • Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537–554. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1 34
    • (1999) CRYPTO 1999. LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 8
    • 84937393537 scopus 로고    scopus 로고
    • Semantically secure McEliece public-key cryptosystems-conversions for McEliece PKC
    • Kim, K. (ed.), Springer, Heidelberg
    • Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems-conversions for McEliece PKC. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 19–35. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44586-2 2
    • (2001) PKC 2001. LNCS , vol.1992 , pp. 19-35
    • Kobara, K.1    Imai, H.2
  • 9
    • 0028294826 scopus 로고
    • On the equivalence of McEliece’s and Nieder-reiter’s public-key cryptosystems
    • Li, Y.X., Deng, R.H., Wang, X.M.: On the equivalence of McEliece’s and Nieder-reiter’s public-key cryptosystems. IEEE Trans. Inf. Theory 40(1), 271–273 (1994)
    • (1994) IEEE Trans. Inf. Theory , vol.40 , Issue.1 , pp. 271-273
    • Li, Y.X.1    Deng, R.H.2    Wang, X.M.3
  • 10
    • 84864818403 scopus 로고    scopus 로고
    • An efficient IND-CCA2 secure variant of the niederreiter encryption scheme in the standard model
    • Susilo, W., Mu, Y., Seberry, J. (eds.), Springer, Heidelberg
    • Preetha Mathew, K., Vasant, S., Venkatesan, S., Pandu Rangan, C.: An efficient IND-CCA2 secure variant of the niederreiter encryption scheme in the standard model. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol. 7372, pp. 166–179. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31448-3 13
    • (2012) ACISP 2012. LNCS , vol.7372 , pp. 166-179
    • Preetha Mathew, K.1    Vasant, S.2    Venkatesan, S.3    Pandu Rangan, C.4
  • 11
    • 0002448405 scopus 로고
    • A public-key cryptosystem based on algebraic coding theory
    • McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Deep Space Netw. Progress Rep. 44, 114–116 (1978)
    • (1978) Deep Space Netw. Progress Rep. , vol.44 , pp. 114-116
    • McEliece, R.J.1
  • 12
    • 0022582790 scopus 로고
    • Knapsack-type cryptosystems and algebraic coding theory
    • Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Prob. Control Inf. Theory 15(2), 159–166 (1986)
    • (1986) Prob. Control Inf. Theory , vol.15 , Issue.2 , pp. 159-166
    • Niederreiter, H.1
  • 13
    • 51349142711 scopus 로고    scopus 로고
    • Semantic security for the McEliece cryptosystem without random oracles
    • Nojima, R., Imai, H., Kobara, K., Morozov, K.: Semantic security for the McEliece cryptosystem without random oracles. Des. Codes Cryptogr. 49(1–3), 289–305 (2008)
    • (2008) Des. Codes Cryptogr. , vol.49 , Issue.1-3 , pp. 289-305
    • Nojima, R.1    Imai, H.2    Kobara, K.3    Morozov, K.4
  • 14
    • 85055706395 scopus 로고    scopus 로고
    • On a CCA2-secure variant of McEliece in the standard model
    • Persichetti, E.: On a CCA2-secure variant of McEliece in the standard model. IACR Cryptology ePrint Archive 2012:268 (2012)
    • (2012) IACR Cryptology Eprint Archive , vol.2012 , pp. 268
    • Persichetti, E.1
  • 15
    • 84884495820 scopus 로고    scopus 로고
    • Secure and anonymous hybrid encryption from coding theory
    • Gaborit, P. (ed.), Springer, Heidelberg
    • Persichetti, E.: Secure and anonymous hybrid encryption from coding theory. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 174–187. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38616-9 12
    • (2013) Pqcrypto 2013. LNCS , vol.7932 , pp. 174-187
    • Persichetti, E.1
  • 16
    • 67650674979 scopus 로고    scopus 로고
    • Chosen-ciphertext security via correlated products
    • Reingold, O. (ed.), Springer, Heidelberg
    • Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 419–436. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00457-5 25
    • (2009) TCC 2009. LNCS , vol.5444 , pp. 419-436
    • Rosen, A.1    Segev, G.2
  • 17
    • 77954406052 scopus 로고    scopus 로고
    • A timing attack against the secret permutation in the McEliece PKC
    • Sendrier, N. (ed.), Springer, Heidelberg
    • Strenzke, F.: A timing attack against the secret permutation in the McEliece PKC. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol. 6061, pp. 95–107. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-12929-2 8
    • (2010) Pqcrypto 2010. LNCS , vol.6061 , pp. 95-107
    • Strenzke, F.1
  • 18
    • 56749169082 scopus 로고    scopus 로고
    • Side channels in the McEliece PKC
    • Buchmann, J., Ding, J. (eds.), Springer, Heidelberg
    • Strenzke, F., Tews, E., Molter, H.G., Overbeck, R., Shoufan, A.: Side channels in the McEliece PKC. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 216–229. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-88403-3 15
    • (2008) Pqcrypto 2008. LNCS , vol.5299 , pp. 216-229
    • Strenzke, F.1    Tews, E.2    Molter, H.G.3    Overbeck, R.4    Shoufan, A.5
  • 19
    • 85021726361 scopus 로고    scopus 로고
    • CCA2 key-privacy for code-based encryption in the standard model
    • Lange, T., Takagi, T. (eds.), Springer, Cham
    • Yoshida, Y., Morozov, K., Tanaka, K.: CCA2 key-privacy for code-based encryption in the standard model. In: Lange, T., Takagi, T. (eds.) PQCrypto 2017. LNCS, vol. 10346, pp. 35–50. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59879-6 3
    • (2017) Pqcrypto 2017. LNCS , vol.10346 , pp. 35-50
    • Yoshida, Y.1    Morozov, K.2    Tanaka, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.