scientific article
From MaRDI portal
Publication:3752293
zbMath0611.94007MaRDI QIDQ3752293
Publication date: 1986
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (94)
Enhanced public key security for the McEliece cryptosystem ⋮ Two attacks on rank metric code-based schemes: RankSign and an IBE scheme ⋮ On the security of the Courtois-Finiasz-Sendrier signature ⋮ Cryptanalysis of Public-Key Cryptosystems That Use Subcodes of Algebraic Geometry Codes ⋮ A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory ⋮ Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model ⋮ Mathematical problems in cryptology ⋮ Security analysis of a cryptosystem based on subspace subcodes ⋮ ECC\(^2\): error correcting code and elliptic curve based cryptosystem ⋮ ON SOME CRYPTOSYSTEMS BASED ON ALGEBRAIC CODES ⋮ Properties of constacyclic codes under the Schur product ⋮ On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes ⋮ Square Code Attack on a Modified Sidelnikov Cryptosystem ⋮ Identity based identification from algebraic coding theory ⋮ Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes ⋮ Niederreiter cryptosystems using quasi-cyclic codes that resist quantum Fourier sampling ⋮ The non-gap sequence of a subcode of a generalized Reed-Solomon code ⋮ Moderate classical McEliece keys from quasi-centrosymmetric Goppa codes ⋮ Skew differential Goppa codes and their application to McEliece cryptosystem ⋮ On the hardness of the Lee syndrome decoding problem ⋮ Graphic lattices made by graph felicitous-type labelings and colorings of topological coding ⋮ Code-Based Signature Schemes from Identification Protocols in the Rank Metric ⋮ A code-based signature scheme from the Lyubashevsky framework ⋮ A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting ⋮ Cryptanalysis and repair of a Gabidulin code based cryptosystem from ACISP 2018 ⋮ An algorithm for generalized syndrome decoding problem ⋮ Hardness estimates of the code equivalence problem in the rank metric ⋮ Improved information set decoding algorithms over Galois ring in the Lee metric ⋮ Key-recovery fault injection attack on the classic McEliece KEM ⋮ Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes ⋮ Retracted: Invertible matrices over some quotient rings: identification, generation, and analysis ⋮ Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures ⋮ Exploring decryption failures of BIKE: new class of weak keys and key recovery attacks ⋮ The syndromes decoding algorithm in group codes ⋮ Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates ⋮ On the equivalence of two post-quantum cryptographic families ⋮ Cryptanalysis of Ivanov-Krouk-Zyablov cryptosystem ⋮ A code-based hybrid signcryption scheme ⋮ Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems ⋮ Post-quantum key exchange for the Internet and the open quantum safe project ⋮ A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial ⋮ A new McEliece-type cryptosystem using Gabidulin-Kronecker product codes ⋮ Lattice polly cracker cryptosystems ⋮ More constructions of lossy and correlation-secure trapdoor functions ⋮ A survey of some applications of finite fields ⋮ Efficient generation of binary words of given weight ⋮ A new algorithm for finding minimum-weight words in large linear codes ⋮ On the unique representation of very strong algebraic geometry codes ⋮ Inner-product functional encryption from random linear codes: trial and challenges ⋮ Computational aspects of retrieving a representation of an algebraic geometry code ⋮ Code-Based Cryptosystems Using Generalized Concatenated Codes ⋮ Attacking and Defending the McEliece Cryptosystem ⋮ A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes ⋮ Joint Source-Cryptographic-Channel Coding Based on Linear Block Codes ⋮ On the Key-Privacy Issue of McEliece Public-Key Encryption ⋮ Quantum-assisted QD-CFS signatures ⋮ Designing a Public Key Cryptosystem Based on Quasi-cyclic Subspace Subcodes of Reed-Solomon Codes ⋮ Quantum Resistant Public Key Encryption Scheme polarRLCE ⋮ Dihedral codes with prescribed minimum distance ⋮ List Decoding for Binary Goppa Codes ⋮ ABOUT THE CONP-COMPLETE “INJECTIVE KNAPSACK” PROBLEM ⋮ Generalization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field $$\mathbb {F}_q$$ ⋮ A NP-Complete Problem in Coding Theory with Application to Code Based Cryptography ⋮ Efficient Implementation of Hybrid Encryption from Coding Theory ⋮ On quasi-cyclic codes as a generalization of cyclic codes ⋮ A framework for cryptographic problems from linear algebra ⋮ Encryption scheme based on expanded Reed-Solomon codes ⋮ Asymmetric code-theoretical schemes constructed with the use of algebraic geometric codes ⋮ A Secure and Efficient Code-Based Signature Scheme ⋮ Bounded distance decoding of linear error-correcting codes with Gröbner bases ⋮ Оценки объемов окрестностей двоичных кодов в терминах их весовых спектров ⋮ A unified approach to deterministic encryption: new constructions and a connection to computational entropy ⋮ Semantic security for the McEliece cryptosystem without random oracles ⋮ Wild McEliece ⋮ Parallel-CFS ⋮ Fast polynomial inversion for post quantum QC-MDPC cryptography ⋮ Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem ⋮ Reducing Key Length of the McEliece Cryptosystem ⋮ Decoding One Out of Many ⋮ Monoidic Codes in Cryptography ⋮ Wild McEliece Incognito ⋮ On quaternary Goppa codes ⋮ Variant of Niederreiter-based signature scheme for blockchain technology ⋮ Cryptanalysis of a system based on twisted Reed-Solomon codes ⋮ Invertible matrices over some quotient rings: identification, generation, and analysis ⋮ Goppa codes over the \(p\)-adic integers and integers modulo \(p^e\) ⋮ Computer algebra tales on Goppa codes and McEliece cryptography ⋮ Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme ⋮ Cryptanalysis of LEDAcrypt ⋮ A new post-quantum multivariate polynomial public key encapsulation algorithm ⋮ On checkable codes in group algebras ⋮ A Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codes ⋮ On the structural security of a McEliece-type cryptosystem based on the sum of tensor products of binary Reed - Muller codes ⋮ The security of the code-based signature scheme based on the Stern identification protocol
This page was built for publication: