Uma família de códigos corretores de erro para criptossistemas eficientes baseados em decodificação de síndromes.
暂无分享,去创建一个
[1] V. Sidelnikov,et al. A public-key cryptosystem based on binary Reed-Muller codes , 1994 .
[2] Elwyn R. Berlekamp,et al. On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[3] Raphael Overbeck,et al. A Summary of McEliece-Type Cryptosystems and their Security , 2007, J. Math. Cryptol..
[4] Alexander Barg,et al. Complexity Issues in Coding Theory , 1997, Electron. Colloquium Comput. Complex..
[5] Christian Wieschebrink,et al. Two NP-complete Problems in Coding Theory with an Application in Code Based Cryptography , 2006, 2006 IEEE International Symposium on Information Theory.
[6] Marco Baldi,et al. Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC Codes , 2007, 2007 IEEE International Symposium on Information Theory.
[7] N. Gisin,et al. Quantum cryptography , 1998 .
[8] Gregor Leander,et al. Practical Key Recovery Attacks On Two McEliece Variants , 2009, IACR Cryptol. ePrint Arch..
[9] Jean-Charles Faugère,et al. Algebraic Cryptanalysis of McEliece Variants with Compact Keys , 2010, EUROCRYPT.
[10] Tanja Lange,et al. Attacking and defending the McEliece cryptosystem , 2008, IACR Cryptol. ePrint Arch..
[11] W. Cary Huffman,et al. Fundamentals of Error-Correcting Codes , 1975 .
[12] Daniele Micciancio. Generalized Compact Knapsacks, Cyclic Lattices, and Efficient One-Way Functions , 2007, computational complexity.
[13] Ayoub Otmani,et al. Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes , 2008, Math. Comput. Sci..
[14] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[15] Robert M. Gray,et al. Toeplitz and Circulant Matrices: A Review , 2005, Found. Trends Commun. Inf. Theory.
[16] Robert M. Gray,et al. Toeplitz And Circulant Matrices: A Review (Foundations and Trends(R) in Communications and Information Theory) , 2006 .
[17] Ernst M. Gabidulin,et al. Ideals over a Non-Commutative Ring and thier Applications in Cryptology , 1991, EUROCRYPT.
[18] Johannes A. Buchmann,et al. Introduction to Cryptography , 2001 .
[19] J. Rosenthal,et al. Using low density parity check codes in the McEliece cryptosystem , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[20] N. Sendrier,et al. Some weak keys in McEliece public-key cryptosystem , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[21] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, CRYPTO.
[22] Nicholas J. Patterson,et al. The algebraic decoding of Goppa codes , 1975, IEEE Trans. Inf. Theory.
[23] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[24] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[25] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[26] Marc Girault,et al. Lightweight code-based identification and signature , 2007, 2007 IEEE International Symposium on Information Theory.
[27] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[28] Paulo S. L. M. Barreto,et al. Compact McEliece Keys from Goppa Codes , 2009, IACR Cryptol. ePrint Arch..
[29] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[30] Matthieu Finiasz,et al. Security Bounds for the Design of Code-Based Cryptosystems , 2009, ASIACRYPT.
[31] Richard C. Singleton,et al. Maximum distance q -nary codes , 1964, IEEE Trans. Inf. Theory.
[32] Oscar Moreno,et al. McEliece Public Key Cryptosystems Using Algebraic-Geometric Codes , 1996, Des. Codes Cryptogr..
[33] J. K. Gibson,et al. Severely denting the Gabidulin version of the McEliece Public Key Cryptosystem , 1995, Des. Codes Cryptogr..
[34] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[35] Raphael Overbeck,et al. Structural Attacks for Public Key Cryptosystems based on Gabidulin Codes , 2008, Journal of Cryptology.
[36] Amin Shokrollahi,et al. Cryptanalysis of the Sidelnikov Cryptosystem , 2007, EUROCRYPT.
[37] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[38] M. N. Gulamhusein,et al. Simple matrix-theory proof of the discrete dyadic convolution theorem , 1973 .
[39] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[40] Marco Baldi,et al. A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes , 2008, SCN.
[41] Philippe Gaborit,et al. Shorter keys for code-based cryptography , 2005 .
[42] Dilip V. Sarwate. On the complexity of decoding Goppa codes (Corresp.) , 1977, IEEE Trans. Inf. Theory.
[43] Thierry P. Berger,et al. Reducing Key Length of the McEliece Cryptosystem , 2009, AFRICACRYPT.
[44] Anne Canteaut,et al. Cryptanalysis of the Original McEliece Cryptosystem , 1998, ASIACRYPT.
[45] J. Hoffstein,et al. An introduction to mathematical cryptography , 2008 .
[46] Nicolas Sendrier,et al. Finding the permutation between equivalent linear codes: The support splitting algorithm , 2000, IEEE Trans. Inf. Theory.