Cryptanalysis of the binary permuted kernel problem
From MaRDI portal
Publication:2117060
DOI10.1007/978-3-030-78375-4_16zbMath1497.94110OpenAlexW3157255480MaRDI QIDQ2117060
Thales Bandiera Paiva, Routo Terada
Publication date: 21 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-78375-4_16
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Number-theoretic algorithms; complexity (11Y16) Computational difficulty of problems (lower bounds, completeness, difficulty of approximation, etc.) (68Q17) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Some remarks on the security of the identification scheme based on permuted kernels
- PKP-based signature scheme
- ``Chinese & Match, an alternative to Atkin's ``Match and Sort method used in the SEA algorithm
- Security Bounds for the Design of Code-Based Cryptosystems
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- An Algorithm for Subgraph Isomorphism
- Smaller Decoding Exponents: Ball-Collision Decoding
This page was built for publication: Cryptanalysis of the binary permuted kernel problem