Practical Key Recovery Attacks On Two McEliece Variants
暂无分享,去创建一个
[1] Thierry P. Berger,et al. Reducing Key Length of the McEliece Cryptosystem , 2009, AFRICACRYPT.
[2] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[3] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[4] John J. Cannon,et al. The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..
[5] Tim Güneysu,et al. MicroEliece: McEliece for Embedded Devices , 2009, CHES.
[6] O. Antoine,et al. Theory of Error-correcting Codes , 2022 .
[7] Philippe Gaborit,et al. Shorter keys for code-based cryptography , 2005 .
[8] J. Rosenthal,et al. Using low density parity check codes in the McEliece cryptosystem , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[9] Christian Wieschebrink,et al. Two NP-complete Problems in Coding Theory with an Application in Code Based Cryptography , 2006, 2006 IEEE International Symposium on Information Theory.
[10] Marco Baldi,et al. Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC Codes , 2007, 2007 IEEE International Symposium on Information Theory.
[11] Paulo S. L. M. Barreto,et al. Compact McEliece Keys from Goppa Codes , 2009, IACR Cryptol. ePrint Arch..
[12] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .