How to mask the structure of codes for a cryptographic use

From MaRDI portal
Publication:2572961

DOI10.1007/s10623-003-6151-2zbMath1136.11327OpenAlexW2026461145MaRDI QIDQ2572961

Thierry P. Berger, Pierre Loidreau

Publication date: 7 November 2005

Published in: Designs, Codes and Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s10623-003-6151-2




Related Items (27)

Enhanced public key security for the McEliece cryptosystemCryptanalysis of Public-Key Cryptosystems That Use Subcodes of Algebraic Geometry CodesCryptanalysis of the BBCRS System on Reed-Muller Binary CodesSecurity analysis of a cryptosystem based on subspace subcodesProperties of constacyclic codes under the Schur productSquare Code Attack on a Modified Sidelnikov CryptosystemDistinguisher-based attacks on public-key cryptosystems using Reed-Solomon codesThe non-gap sequence of a subcode of a generalized Reed-Solomon codeDistinguishing and recovering generalized linearized Reed-Solomon codesStructural attacks for public key cryptosystems based on Gabidulin codesCryptanalysis of two McEliece cryptosystems based on quasi-cyclic codesThe syndromes decoding algorithm in group codesCryptanalysis of Ivanov-Krouk-Zyablov cryptosystemA code-based hybrid signcryption schemeOn linear codes with random multiplier vectors and the maximum trace dimension propertyOn the unique representation of very strong algebraic geometry codesComputational aspects of retrieving a representation of an algebraic geometry codeCode-Based Cryptosystems Using Generalized Concatenated CodesErasure decoding for Gabidulin codesA NP-Complete Problem in Coding Theory with Application to Code Based CryptographyEncryption scheme based on expanded Reed-Solomon codesOn the Berger - Loidreau Cryptosystem on the Tensor Product of CodesWild McEliece IncognitoCryptanalysis of a system based on twisted Reed-Solomon codesClassification of Hadamard products of one-codimensional subcodes of Reed-Muller codesA Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codesOn the structural security of a McEliece-type cryptosystem based on the sum of tensor products of binary Reed - Muller codes


Uses Software


Cites Work


This page was built for publication: How to mask the structure of codes for a cryptographic use