scientific article

From MaRDI portal
Revision as of 11:18, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3752293

zbMath0611.94007MaRDI QIDQ3752293

Harald Niederreiter

Publication date: 1986


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (94)

Enhanced public key security for the McEliece cryptosystemTwo attacks on rank metric code-based schemes: RankSign and an IBE schemeOn the security of the Courtois-Finiasz-Sendrier signatureCryptanalysis of Public-Key Cryptosystems That Use Subcodes of Algebraic Geometry CodesA Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding TheoryEfficient Code Based Hybrid and Deterministic Encryptions in the Standard ModelMathematical problems in cryptologySecurity analysis of a cryptosystem based on subspace subcodesECC\(^2\): error correcting code and elliptic curve based cryptosystemON SOME CRYPTOSYSTEMS BASED ON ALGEBRAIC CODESProperties of constacyclic codes under the Schur productOn Weak Keys and Forgery Attacks Against Polynomial-Based MAC SchemesSquare Code Attack on a Modified Sidelnikov CryptosystemIdentity based identification from algebraic coding theoryDistinguisher-based attacks on public-key cryptosystems using Reed-Solomon codesNiederreiter cryptosystems using quasi-cyclic codes that resist quantum Fourier samplingThe non-gap sequence of a subcode of a generalized Reed-Solomon codeModerate classical McEliece keys from quasi-centrosymmetric Goppa codesSkew differential Goppa codes and their application to McEliece cryptosystemOn the hardness of the Lee syndrome decoding problemGraphic lattices made by graph felicitous-type labelings and colorings of topological codingCode-Based Signature Schemes from Identification Protocols in the Rank MetricA code-based signature scheme from the Lyubashevsky frameworkA post-quantum hybrid encryption based on QC-LDPC codes in the multi-user settingCryptanalysis and repair of a Gabidulin code based cryptosystem from ACISP 2018An algorithm for generalized syndrome decoding problemHardness estimates of the code equivalence problem in the rank metricImproved information set decoding algorithms over Galois ring in the Lee metricKey-recovery fault injection attack on the classic McEliece KEMCryptanalysis of two McEliece cryptosystems based on quasi-cyclic codesRetracted: Invertible matrices over some quotient rings: identification, generation, and analysisRoadmap of post-quantum cryptography standardization: side-channel attacks and countermeasuresExploring decryption failures of BIKE: new class of weak keys and key recovery attacksThe syndromes decoding algorithm in group codesFault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidatesOn the equivalence of two post-quantum cryptographic familiesCryptanalysis of Ivanov-Krouk-Zyablov cryptosystemA code-based hybrid signcryption schemeKey-recovery by side-channel information on the matrix-vector product in code-based cryptosystemsPost-quantum key exchange for the Internet and the open quantum safe projectA side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomialA new McEliece-type cryptosystem using Gabidulin-Kronecker product codesLattice polly cracker cryptosystemsMore constructions of lossy and correlation-secure trapdoor functionsA survey of some applications of finite fieldsEfficient generation of binary words of given weightA new algorithm for finding minimum-weight words in large linear codesOn the unique representation of very strong algebraic geometry codesInner-product functional encryption from random linear codes: trial and challengesComputational aspects of retrieving a representation of an algebraic geometry codeCode-Based Cryptosystems Using Generalized Concatenated CodesAttacking and Defending the McEliece CryptosystemA New Analysis of the McEliece Cryptosystem Based on QC-LDPC CodesJoint Source-Cryptographic-Channel Coding Based on Linear Block CodesOn the Key-Privacy Issue of McEliece Public-Key EncryptionQuantum-assisted QD-CFS signaturesDesigning a Public Key Cryptosystem Based on Quasi-cyclic Subspace Subcodes of Reed-Solomon CodesQuantum Resistant Public Key Encryption Scheme polarRLCEDihedral codes with prescribed minimum distanceList Decoding for Binary Goppa CodesABOUT THE CONP-COMPLETE “INJECTIVE KNAPSACK” PROBLEMGeneralization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field $$\mathbb {F}_q$$A NP-Complete Problem in Coding Theory with Application to Code Based CryptographyEfficient Implementation of Hybrid Encryption from Coding TheoryOn quasi-cyclic codes as a generalization of cyclic codesA framework for cryptographic problems from linear algebraEncryption scheme based on expanded Reed-Solomon codesAsymmetric code-theoretical schemes constructed with the use of algebraic geometric codesA Secure and Efficient Code-Based Signature SchemeBounded distance decoding of linear error-correcting codes with Gröbner basesОценки объемов окрестностей двоичных кодов в терминах их весовых спектровA unified approach to deterministic encryption: new constructions and a connection to computational entropySemantic security for the McEliece cryptosystem without random oraclesWild McElieceParallel-CFSFast polynomial inversion for post quantum QC-MDPC cryptographyMessage-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystemReducing Key Length of the McEliece CryptosystemDecoding One Out of ManyMonoidic Codes in CryptographyWild McEliece IncognitoOn quaternary Goppa codesVariant of Niederreiter-based signature scheme for blockchain technologyCryptanalysis of a system based on twisted Reed-Solomon codesInvertible matrices over some quotient rings: identification, generation, and analysisGoppa codes over the \(p\)-adic integers and integers modulo \(p^e\)Computer algebra tales on Goppa codes and McEliece cryptographyTowards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature SchemeCryptanalysis of LEDAcryptA new post-quantum multivariate polynomial public key encapsulation algorithmOn checkable codes in group algebrasA Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codesOn the structural security of a McEliece-type cryptosystem based on the sum of tensor products of binary Reed - Muller codesThe security of the code-based signature scheme based on the Stern identification protocol




This page was built for publication: