Wild McEliece
From MaRDI portal
Publication:3084251
DOI10.1007/978-3-642-19574-7_10zbMath1290.94041OpenAlexW2913061117MaRDI QIDQ3084251
Christiane Peters, Daniel J. Bernstein, Tanja Lange
Publication date: 15 March 2011
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19574-7_10
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Decoding (94B35)
Related Items
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes ⋮ On the hardnesses of several quantum decoding problems ⋮ Breaking Goppa-based McEliece with hints ⋮ Decoding McEliece with a hint -- secret Goppa key parts reveal everything ⋮ Strongly secure authenticated key exchange from factoring, codes, and lattices ⋮ List Decoding for Binary Goppa Codes ⋮ Encryption scheme based on expanded Reed-Solomon codes ⋮ New identities relating wild Goppa codes ⋮ Monoidic Codes in Cryptography ⋮ Simplified High-Speed High-Distance List Decoding for Alternant Codes ⋮ Wild McEliece Incognito
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18--22, 2002. Proceedings
- Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17--19, 2008. Proceedings
- Advances in cryptology -- EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 -- June 3, 2010. Proceedings
- Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25--28, 2010. Proceedings
- Progress in cryptology -- AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21--25, 2009. Proceedings
- Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13--14, 2009. Revised selected papers
- Advances in cryptology -- ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6--10, 2009. Proceedings
- Coding theory and applications. 3rd international Colloquium, Toulon, France, November 2-4, 1988. Proceedings
- McEliece public key cryptosystems using algebraic-geometric codes
- List Decoding for Binary Goppa Codes
- Attacking and Defending the McEliece Cryptosystem
- Algebraic Cryptanalysis of McEliece Variants with Compact Keys
- Grover vs. McEliece
- Information-Set Decoding for Linear Codes over F q
- Code-based cryptography
- Reducing Key Length of the McEliece Cryptosystem
- Security Bounds for the Design of Code-Based Cryptosystems
- Compact McEliece Keys from Goppa Codes
- On the parameters of Goppa codes
- The algebraic decoding of Goppa codes
- Further results on Goppa codes and their applications to constructing efficient binary codes
- On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
- A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
- Finding the permutation between equivalent linear codes: the support splitting algorithm
- Improved decoding of Reed-Solomon and algebraic-geometry codes
- Representation Theory, Group Rings, and Coding Theory
- Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13--15, 2001. Proceedings
- Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9--13, 2001. Proceedings
This page was built for publication: Wild McEliece