Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes
暂无分享,去创建一个
[1] John J. Cannon,et al. The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..
[2] V. Sidelnikov,et al. A public-key cryptosystem based on binary Reed-Muller codes , 1994 .
[3] Christian Wieschebrink,et al. An Attack on a Modified Niederreiter Encryption Scheme , 2006, Public Key Cryptography.
[4] Pierre-Louis Cayrel,et al. On Kabatianskii-Krouk-Smeets Signatures , 2007, WAIFI.
[5] Marc Girault,et al. Lightweight code-based identification and signature , 2007, 2007 IEEE International Symposium on Information Theory.
[6] J. Rosenthal,et al. Using low density parity check codes in the McEliece cryptosystem , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[7] Amin Shokrollahi,et al. Cryptanalysis of the Sidelnikov Cryptosystem , 2007, EUROCRYPT.
[8] Marco Baldi,et al. Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC Codes , 2007, 2007 IEEE International Symposium on Information Theory.
[9] Raphael Overbeck,et al. A Summary of McEliece-Type Cryptosystems and their Security , 2007, J. Math. Cryptol..
[10] Tanja Lange,et al. Attacking and defending the McEliece cryptosystem , 2008, IACR Cryptol. ePrint Arch..
[11] Thierry P. Berger,et al. How to Mask the Structure of Codes for a Cryptographic Use , 2005, Des. Codes Cryptogr..
[12] Cédric Lauradoux,et al. SYND: a Fast Code-Based Stream Cipher with a Security Reduction , 2007, 2007 IEEE International Symposium on Information Theory.
[13] Jacques Stern,et al. A method for finding codewords of small weight , 1989, Coding Theory and Applications.
[14] Philippe Gaborit,et al. Shorter keys for code-based cryptography , 2005 .
[15] Anne Canteaut,et al. A further improvement of the work factor in an attempt at breaking McEliece's cryptosystem , 1994 .
[16] Ernst M. Gabidulin,et al. Public_Key Cryptosystems Based on Linear Codes , 1995 .
[17] V. Sidelnikov,et al. On insecurity of cryptosystems based on generalized Reed-Solomon codes , 1992 .
[18] Nicolas Sendrier,et al. On the Concatenated Structure of a Linear Code , 1998, Applicable Algebra in Engineering, Communication and Computing.
[19] Elwyn R. Berlekamp,et al. On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[20] Ernest F. Brickell,et al. An Observation on the Security of McEliece's Public-Key Cryptosystem , 1988, EUROCRYPT.
[21] Jeffrey S. Leon,et al. A probabilistic algorithm for computing minimum weights of large error-correcting codes , 1988, IEEE Trans. Inf. Theory.
[22] Robert H. Deng,et al. On the equivalence of McEliece's and Niederreiter's public-key cryptosystems , 1994, IEEE Trans. Inf. Theory.
[23] Anne Canteaut,et al. A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to McEliece’s Cryptosystem and to Narrow-Sense BCH Codes of Length , 1998 .