Quantum resistant public key encryption scheme polarRLCE
From MaRDI portal
Publication:3294872
DOI10.1007/978-3-030-36237-9_7zbMATH Open1457.94160OpenAlexW2995381399MaRDI QIDQ3294872FDOQ3294872
Authors: Jingang Liu, Y. Wang, Zongxinag Yi, Dingyi Pei
Publication date: 29 June 2020
Published in: Algebra, Codes and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-36237-9_7
Recommendations
- Polar coding for ring-LWE-based public key encryption
- Cryptanalysis of the McEliece public key cryptosystem based on polar codes
- Compact McEliece keys based on quasi-dyadic Srivastava codes
- Recovering short secret keys of RLCE in polynomial time
- Designing a Public Key Cryptosystem Based on Quasi-cyclic Subspace Subcodes of Reed-Solomon Codes
Cites Work
- Title not available (Why is that?)
- Attacking and Defending the McEliece Cryptosystem
- Information-set decoding for linear codes over \(\mathbb F_q\)
- Security bounds for the design of code-based cryptosystems
- Title not available (Why is that?)
- Finding the permutation between equivalent linear codes: the support splitting algorithm
- Enhanced public key security for the McEliece cryptosystem
- Title not available (Why is that?)
- Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
- On the edge-independence number and edge-covering number for regular graphs
- Title not available (Why is that?)
- Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels
- A public-key cryptosystem based on binary Reed-Muller codes
- Cryptanalysis of the Sidelnikov Cryptosystem
- Cryptanalysis of the McEliece public key cryptosystem based on polar codes
- McEliece public key cryptosystems using algebraic-geometric codes
- Recovering short secret keys of RLCE in polynomial time
- Squares of Random Linear Codes
- Analysis of information set decoding for a sub-linear error weight
- On computing nearest neighbors with applications to decoding of binary linear codes
- A key recovery attack on MDPC with CCA security using decoding errors
- On the CCA2 security of McEliece in the standard model
- QC-MDPC: a timing attack and a CCA2 KEM
- Square code attack on a modified Sidelnikov cryptosystem
Cited In (3)
Uses Software
This page was built for publication: Quantum resistant public key encryption scheme polarRLCE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3294872)