On the inherent intractability of certain coding problems (Corresp.)

From MaRDI portal
Revision as of 10:39, 6 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4156300

DOI10.1109/TIT.1978.1055873zbMath0377.94018WikidataQ28019921 ScholiaQ28019921MaRDI QIDQ4156300

Elwyn R. Berlekamp, Henk C. A. van Tilborg, Robert J. McEliece

Publication date: 1978

Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)




Related Items (only showing first 100 items - show all)

Randomized Decoding of Gabidulin Codes Beyond the Unique Decoding RadiusOn the Parameterized Complexity of Girth and Connectivity Problems on Linear MatroidsA Summary of McEliece-Type Cryptosystems and their SecurityImproved Information Set Decoding for Code-Based Cryptosystems with Constrained MemoryBasics of Secrecy CodingCovering Vectors by Spaces: Regular MatroidsGeneralization of the Ball-Collision AlgorithmQuantum machine learning: a classical perspectiveIND-CCA2 secure McEliece-type modification in the standard modelA Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding TheoryON SOME CRYPTOSYSTEMS BASED ON ALGEBRAIC CODESSur la complexité d'un problème de codageModerate classical McEliece keys from quasi-centrosymmetric Goppa codesAttack on a code-based signature scheme from QC-LDPC codesSecurity enhancement method using shortened error correcting codesOn Simplifying Expressions with Mixed Boolean-ArithmeticA new key recovery attack on a code-based signature from the Lyubashevsky frameworkThe return of the SDitHOn the hardness of the Lee syndrome decoding problemAssessing and Countering Reaction Attacks Against Post-Quantum Public-Key Cryptosystems Based on QC-LDPC CodesEntanglement Between Hash Encodings and Signatures from ID Schemes with Non-binary Challenges: A Case Study on Lightweight Code-Based SignaturesCryptanalysis and repair of a Gabidulin code based cryptosystem from ACISP 2018Interleaved Prange: a new generic decoder for interleaved codesAn algorithm for generalized syndrome decoding problemMinimal codewords arising from the incidence of points and hyperplanes in projective spacesPolynomial-time plaintext recovery attacks on the IKKR code-based cryptosystemsOn the (in)security of optimized Stern-like signature schemesImproved information set decoding algorithms over Galois ring in the Lee metricKey-recovery fault injection attack on the classic McEliece KEMMcEliece-type encryption based on Gabidulin codes with no hidden structureRoadmap of post-quantum cryptography standardization: side-channel attacks and countermeasuresExploring decryption failures of BIKE: new class of weak keys and key recovery attacksA new key recovery side-channel attack on HQC with chosen ciphertextTernary forking lemma and its application to the analysis of one code-based signatureThe weight distribution of codes over finite chain ringsOn new problems in asymmetric cryptography based on error-resistant codingInformation set decoding for Lee-metric codes using restricted ballsA code-based hybrid signcryption schemeKey-recovery by side-channel information on the matrix-vector product in code-based cryptosystemsA side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomialA new McEliece-type cryptosystem using Gabidulin-Kronecker product codesHow to Encrypt with the LPN ProblemCryptanalysis of Harari's identification schemeCode-Based Cryptosystems Using Generalized Concatenated CodesEfficient and effective quantum compiling for entanglement-based machine learning on IBM Q devicesA New Efficient Threshold Ring Signature Scheme Based on Coding TheoryMcEliece Cryptosystem Implementation: Theory and PracticeA New Analysis of the McEliece Cryptosystem Based on QC-LDPC CodesDesigning a Public Key Cryptosystem Based on Quasi-cyclic Subspace Subcodes of Reed-Solomon CodesParameterized Intractability of Even Set and Shortest Vector Problem from Gap-ETHA survey on proper codesTinyKeys: a new approach to efficient multi-party computationMultisecret-sharing schemes and bounded distance decoding of linear codesGeneralization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field $$\mathbb {F}_q$$A NP-Complete Problem in Coding Theory with Application to Code Based CryptographyA New Dynamic Code-Based Group Signature SchemeParallel and Concurrent Security of the HB and HB +  ProtocolsOn the Security of HB# against a Man-in-the-Middle AttackParallel and concurrent security of the HB and \(HB^{+}\) protocolsA Secure and Efficient Code-Based Signature SchemeA CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard ModelCounting faces of randomly projected polytopes when the projection radically lowers dimensionDiagnosis of Partially Observed Petri Net Based on Analytical Redundancy RelationshipsOn quantiles of minimal codeword weights of random linear codes over $\mathbf{F}_p$A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding ProblemWeighted counting of solutions to sparse systems of equationsReducing Key Length of the McEliece CryptosystemThe solution space geometry of random linear equationsFull Cryptanalysis of the Chen Identification ProtocolDecoding One Out of ManyA new identification algorithmEnsuring Message Embedding in Wet Paper SteganographyGallager error-correcting codes for binary asymmetric channelsOblivious Transfer Based on the McEliece AssumptionsTowards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature SchemeComputing coset leaders and leader codewords of binary codesA Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codesA Practical Group Signature Scheme Based on Rank MetricThe security of the code-based signature scheme based on the Stern identification protocolAn inductive construction of minimal codesToward secure implementation of McEliece decryptionEnhanced public key security for the McEliece cryptosystemOn the security of the modified dual-Ouroboros PKE using Gabidulin codesCryptography from Learning Parity with NoiseFast \(\ell _{1}\) minimization by iterative thresholding for multidimensional NMR spectroscopyQuantum computation vs. firewallsLow-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2\)] ⋮ Factorization properties of lattices over the integersSolving linear equations parameterized by Hamming weightOn finding a cycle basis with a shortest maximal cycleImproved identification schemes based on error-correcting codesStructural properties of self-dual monomial codes with application to code-based cryptographyOn the ideal associated to a linear codeThe hardness of approximate optima in lattices, codes, and systems of linear equationsMinimal linear codes constructed from functionsDecoding of Reed Solomon codes beyond the error-correction boundThe rank-based cryptography librarySecurity analysis of a cryptosystem based on subspace subcodesInformation-set decoding with hintsPerformance bounds for QC-MDPC codes decoders







This page was built for publication: On the inherent intractability of certain coding problems (Corresp.)