Algebraic properties of polar codes from a new polynomial formalism
暂无分享,去创建一个
Ayoub Otmani | Jean-Pierre Tillich | Magali Bardet | Vlad Dragoi | M. Bardet | J. Tillich | A. Otmani | V. Dragoi
[1] O. Antoine,et al. Theory of Error-correcting Codes , 2022 .
[2] Kazukuni Kobara. Code-Based Public-Key Cryptosystems and Their Applications , 2009, ICITS.
[3] Ayoub Otmani,et al. Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes , 2016, PQCrypto.
[4] Jean-Charles Faugère,et al. A Distinguisher for High-Rate McEliece Cryptosystems , 2011, IEEE Transactions on Information Theory.
[5] Bernhard C. Geiger,et al. The Fractality of Polar and Reed–Muller Codes † , 2015, Entropy.
[6] Hugues Randriambololona,et al. On products and powers of linear codes under componentwise multiplication , 2013, ArXiv.
[7] Alexander Vardy,et al. How to Construct Polar Codes , 2011, IEEE Transactions on Information Theory.
[8] Ignacio Cascudo,et al. Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field , 2009, CRYPTO.
[9] Christian Wieschebrink. Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes , 2010, PQCrypto.
[10] Rüdiger L. Urbanke,et al. Polar Codes for Channel and Source Coding , 2009, ArXiv.
[11] Jean-Charles Faugère,et al. A Distinguisher for High-Rate McEliece Cryptosystems , 2013, IEEE Trans. Inf. Theory.
[12] Rüdiger L. Urbanke,et al. Modern Coding Theory , 2008 .
[13] Santhosh Kumar,et al. Reed–Muller Codes Achieve Capacity on Erasure Channels , 2015, IEEE Transactions on Information Theory.
[14] Pascale Charpin. Codes cycliques étendus affines-invariants et antichaines d'un ensemble partiellement ordonne , 1990, Discret. Math..
[15] Erdal Arikan,et al. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.
[16] Alain Couvreur,et al. Polynomial Time Attack on Wild McEliece Over Quadratic Extensions , 2017, IEEE Transactions on Information Theory.
[17] Tadao Kasami,et al. On the Weight Enumeration of Weights Less than 2.5d of Reed-Muller Codes , 1976, Inf. Control..
[18] Joseph M Renes,et al. Efficient polar coding of quantum information. , 2011, Physical review letters.
[19] Ilya Dumer,et al. Soft-decision decoding of Reed-Muller codes: a simplified algorithm , 2006, IEEE Transactions on Information Theory.
[20] Alain Couvreur,et al. A polynomial time attack against algebraic geometry code based public key cryptosystems , 2014, 2014 IEEE International Symposium on Information Theory.
[21] Ryuhei Mori,et al. Performance and construction of polar codes on symmetric binary-input memoryless channels , 2009, 2009 IEEE International Symposium on Information Theory.
[22] Rüdiger L. Urbanke,et al. Reed-Muller Codes Achieve Capacity on the Binary Erasure Channel under MAP Decoding , 2015, ArXiv.
[23] Eren Sasoglu,et al. Polarization and Polar Codes , 2012, Found. Trends Commun. Inf. Theory.
[24] Young-Sik Kim,et al. New McEliece cryptosystem based on polar codes as a candidate for post-quantum cryptography , 2014, 2014 14th International Symposium on Communications and Information Technologies (ISCIT).
[25] Ruud Pellikaan,et al. On decoding by error location and dependent sets of error positions , 1992, Discret. Math..
[26] Alain Couvreur,et al. Distinguisher-based attacks on public-key cryptosystems using Reed–Solomon codes , 2013, Des. Codes Cryptogr..
[27] Ignacio Cascudo,et al. The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing , 2011, CRYPTO.
[28] Gilles Zémor,et al. Discrete Isoperimetric Inequalities and the Probability of a Decoding Error , 2000, Combinatorics, Probability and Computing.
[29] P. Charpin,et al. Affine-invariant extended cyclic codes and partially ordered sets of antichains , 1990 .
[30] Mikhail A. Borodin,et al. Effective attack on the McEliece cryptosystem based on Reed-Muller codes , 2014 .