Semantic security for the McEliece cryptosystem without random oracles

From MaRDI portal
Revision as of 21:21, 30 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1009060

DOI10.1007/S10623-008-9175-9zbMath1196.94062DBLPjournals/dcc/NojimaIKM08OpenAlexW2137648527WikidataQ59383161 ScholiaQ59383161MaRDI QIDQ1009060

Ryo Nojima, Kirill Morozov, Kazukuni Kobara, Hiroshi Imai

Publication date: 31 March 2009

Published in: Designs, Codes and Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s10623-008-9175-9






Related Items (26)

CCA secure \textit{a posteriori} openable encryption in the standard modelSemantic Security and Key-Privacy with Random Split of St-Gen CodesIND-CCA2 secure McEliece-type modification in the standard modelEfficient Code Based Hybrid and Deterministic Encryptions in the Standard ModelA rank metric code-based group signature schemeUsing low-density parity-check codes to improve the McEliece cryptosystemWeaknesses in Two RFID Authentication ProtocolsHow to backdoor (classic) McEliece and how to guard against backdoorsA new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channelsAmount of key information contained in plain and encrypted text sets of the symmetric randomized McEliece cryptosystemOn the Key-Privacy Issue of McEliece Public-Key EncryptionStrongly secure authenticated key exchange from factoring, codes, and latticesON THE CONSTRUCTION OF A SEMANTICALLY SECURE MODIFICATION OF THE MCELIECE CRYPTOSYSTEMDAGS: key encapsulation using dyadic GS codesCode-Based Public-Key Cryptosystems and Their ApplicationsDifferential Power Analysis of a McEliece CryptosystemLIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decodingCode-based secret handshake scheme, revisitedOn two modifications of the McEliece PKE and the CFS signature schemePost-quantum secure fully-dynamic logarithmic-size deniable group signature in code-based settingGroup encryption: full dynamicity, message filtering and code-based instantiationA CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard ModelShort code-based one-out-of-many proofs and applicationsOn the Berger - Loidreau Cryptosystem on the Tensor Product of CodesGroup encryption: full dynamicity, message filtering and code-based instantiationOblivious Transfer Based on the McEliece Assumptions


Uses Software



Cites Work




This page was built for publication: Semantic security for the McEliece cryptosystem without random oracles