The non-gap sequence of a subcode of a generalized Reed-Solomon code (Q1934242): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
Import recommendations run Q6534273
 
(8 intermediate revisions by 7 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s10623-012-9694-2 / rank
Normal rank
 
Property / author
 
Property / author: Pellikaan, Ruud / rank
Normal rank
 
Property / reviewed by
 
Property / reviewed by: Adrian Atanasiu / rank
Normal rank
 
Property / author
 
Property / author: Pellikaan, Ruud / rank
 
Normal rank
Property / reviewed by
 
Property / reviewed by: Adrian Atanasiu / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: McEliece / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s10623-012-9694-2 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2126075688 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to mask the structure of codes for a cryptographic use / rank
 
Normal rank
Property / cites work
 
Property / cites work: Grover vs. McEliece / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distance bounds for algebraic geometric codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the order bounds for one-point AG codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4242017 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New generalizations of the Reed-Muller codes--I: Primitive codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the equivalence of McEliece's and Niederreiter's public-key cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3752293 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Code-based cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the edge-independence number and edge-covering number for regular graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: A lower bound for the number of solutions of equations over finite fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic function fields and codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography - PKC 2006 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S10623-012-9694-2 / rank
 
Normal rank
Property / Recommended article
 
Property / Recommended article: Public Key Cryptography - PKC 2006 / rank
 
Normal rank
Property / Recommended article: Public Key Cryptography - PKC 2006 / qualifier
 
Similarity Score: 0.7661156
Amount0.7661156
Unit1
Property / Recommended article: Public Key Cryptography - PKC 2006 / qualifier
 
Property / Recommended article
 
Property / Recommended article: Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes / rank
 
Normal rank
Property / Recommended article: Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes / qualifier
 
Similarity Score: 0.75617933
Amount0.75617933
Unit1
Property / Recommended article: Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes / qualifier
 
Property / Recommended article
 
Property / Recommended article: Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice / rank
 
Normal rank
Property / Recommended article: Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice / qualifier
 
Similarity Score: 0.74174917
Amount0.74174917
Unit1
Property / Recommended article: Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice / qualifier
 
Property / Recommended article
 
Property / Recommended article: A note on the Sidelnikov-Shestakov attack of Niederreiter scheme / rank
 
Normal rank
Property / Recommended article: A note on the Sidelnikov-Shestakov attack of Niederreiter scheme / qualifier
 
Similarity Score: 0.73817647
Amount0.73817647
Unit1
Property / Recommended article: A note on the Sidelnikov-Shestakov attack of Niederreiter scheme / qualifier
 
Property / Recommended article
 
Property / Recommended article: Q3758716 / rank
 
Normal rank
Property / Recommended article: Q3758716 / qualifier
 
Similarity Score: 0.7323896
Amount0.7323896
Unit1
Property / Recommended article: Q3758716 / qualifier
 
Property / Recommended article
 
Property / Recommended article: Bounded distance+1 soft-decision Reed-Solomon decoding / rank
 
Normal rank
Property / Recommended article: Bounded distance+1 soft-decision Reed-Solomon decoding / qualifier
 
Similarity Score: 0.7316849
Amount0.7316849
Unit1
Property / Recommended article: Bounded distance+1 soft-decision Reed-Solomon decoding / qualifier
 
Property / Recommended article
 
Property / Recommended article: On the decoder error probability for Reed - Solomon codes (Corresp.) / rank
 
Normal rank
Property / Recommended article: On the decoder error probability for Reed - Solomon codes (Corresp.) / qualifier
 
Similarity Score: 0.7302569
Amount0.7302569
Unit1
Property / Recommended article: On the decoder error probability for Reed - Solomon codes (Corresp.) / qualifier
 
Property / Recommended article
 
Property / Recommended article: Q4474270 / rank
 
Normal rank
Property / Recommended article: Q4474270 / qualifier
 
Similarity Score: 0.7285472
Amount0.7285472
Unit1
Property / Recommended article: Q4474270 / qualifier
 
Property / Recommended article
 
Property / Recommended article: How to avoid the Sidel'nikov-Shestakov attack / rank
 
Normal rank
Property / Recommended article: How to avoid the Sidel'nikov-Shestakov attack / qualifier
 
Similarity Score: 0.72768956
Amount0.72768956
Unit1
Property / Recommended article: How to avoid the Sidel'nikov-Shestakov attack / qualifier
 
Property / Recommended article
 
Property / Recommended article: CHARACTERISTICS OF HADAMARD SQUARE OF SPECIAL REED — MULLER SUBCODES / rank
 
Normal rank
Property / Recommended article: CHARACTERISTICS OF HADAMARD SQUARE OF SPECIAL REED — MULLER SUBCODES / qualifier
 
Similarity Score: 0.7234534
Amount0.7234534
Unit1
Property / Recommended article: CHARACTERISTICS OF HADAMARD SQUARE OF SPECIAL REED — MULLER SUBCODES / qualifier
 
links / mardi / namelinks / mardi / name
 

Latest revision as of 20:11, 27 January 2025

scientific article
Language Label Description Also known as
English
The non-gap sequence of a subcode of a generalized Reed-Solomon code
scientific article

    Statements

    The non-gap sequence of a subcode of a generalized Reed-Solomon code (English)
    0 references
    0 references
    0 references
    28 January 2013
    0 references
    The Berger-Loidreau cryptosystem [\textit{T. P. Berger} and \textit{P. Loidreau}, ibid. 35, No. 1, 63--79 (2005; Zbl 1136.11327)] is a version of an older scheme based on a class of error-correcting codes, namely the generalized Reed-Solomon (GRS) codes. It was made in order to resist against the Sidel'nikov-Shestakov attack [\textit{V. M. Sidel'nikov} and \textit{S. O. Shestakov}, Discrete Math. Appl. 2, No. 4, 439--444 (1992); translation from Diskretn. Mat. 4, No. 3, 57--63 (1992; Zbl 0796.94006)]. But, using the remark that if the square code of an \((n,k)\)-GRS code is itself a code of length \(2k-1\) then the secret key generated is cryptographically weak (and the Sidel'nikov-Shestakov scheme can construct it in polynomial time). The goal of the paper is to estimate what is the proportion of weak keys in this cryptosystem (meaning the probability that an arbitrary subcode of a GRS code is itself a GRS code). The mathematical instrument used is the notion of non-gaps sequences associated to subcodes (the number of non-gaps sequences is closely related with the number of subcodes of a GRS code which are itself GRS codes). The authors analyse the two possible cases when subcodes of a GRS code are weak keys: (1) when they are themselves GRS codes (Section 4 of the paper concludes that the probability of their occurrence is very small), and (2) they are subcodes whose square code is a GRS code of maximal dimension (Sections 5 and 6 give an estimation of their number, by concluding that the number of weak keys is proportionally high). Even if the restrictions imposed for the last case are somehow strange, the authors claim that they ``are sure that a sharper and more general result can be achieved''.
    0 references
    Berger-Loidreau cryptosystem
    0 references
    square codes
    0 references
    GRS codes
    0 references
    gaps of a code
    0 references

    Identifiers