Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes
From MaRDI portal
Publication:3569137
Recommendations
- Public Key Cryptography - PKC 2006
- On the edge-independence number and edge-covering number for regular graphs
- Structural cryptanalysis of McEliece schemes with compact keys
- A note on the Sidelnikov-Shestakov attack of Niederreiter scheme
- Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes
Cited in
(53)- Vulnerabilities of ``McEliece in the world of Escher
- Distinguishing and recovering generalized linearized Reed-Solomon codes
- How to avoid the Sidel'nikov-Shestakov attack
- Computational aspects of retrieving a representation of an algebraic geometry code
- A fault attack on the Niederreiter cryptosystem using binary irreducible Goppa codes
- Squares of matrix-product codes
- Enhanced public key security for the McEliece cryptosystem
- Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
- Automating the functional correspondence between higher-order evaluators and abstract machines
- The use of the direct sum decomposition algorithm for analyzing the strength of some McEliece-type cryptosystems
- On the structural security of a McEliece-type cryptosystem based on the sum of tensor products of binary Reed - Muller codes
- Encryption scheme based on expanded Reed-Solomon codes
- On the dimension of the subfield subcodes of 1-point Hermitian codes
- An improvement of the Niederreiter public-key cryptosystem by using dual public keys
- The non-gap sequence of a subcode of a generalized Reed-Solomon code
- A graph-theoretical method for decoding some group MLD-codes
- Cryptanalysis of Ivanov-Krouk-Zyablov cryptosystem
- Structural properties of self-dual monomial codes with application to code-based cryptography
- A secure and efficient code-based signature scheme
- Square code attack on a modified Sidelnikov cryptosystem
- On the unique representation of very strong algebraic geometry codes
- A Subfield Lattice Attack on Overstretched NTRU Assumptions
- scientific article; zbMATH DE number 2154106 (Why is no real title available?)
- Security analysis of a cryptosystem based on subspace subcodes
- Code-based cryptosystems using generalized concatenated codes
- On linear codes with random multiplier vectors and the maximum trace dimension property
- The syndromes decoding algorithm in group codes
- How to mask the structure of codes for a cryptographic use
- Public Key Cryptography - PKC 2006
- On ideals in group algebras: an uncertainty principle and the Schur product
- The quadratic hull of a code and the geometric view on multiplication algorithms
- Cryptanalysis of a system based on twisted Reed-Solomon codes
- A note on the Sidelnikov-Shestakov attack of Niederreiter scheme
- Properties of constacyclic codes under the Schur product
- Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice
- Wild McEliece Incognito
- On the Berger-Loidreau cryptosystem on the tensor product of codes
- Lossy cryptography from code-based assumptions
- An attack on a non-interactive key exchange from code equivalence
- Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes
- Cryptanalysis of the BBCRS system on Reed-Muller binary code
- Classification of Hadamard products of one-codimensional subcodes of Reed-Muller codes
- Cryptanalysis of the McEliece public key cryptosystem based on polar codes
- On the dimension and structure of the square of the dual of a Goppa code
- A novel Niederreiter-like cryptosystem based on the \((u|u + \upsilon)\)-construction codes
- Estimating the dimension of the subfield subcodes of Hermitian codes
- Broadcast attacks against code-based schemes
- A Hadamard product of linear codes: algebraic properties and algorithms for calculating it
- Complete classification of Hadamard products of codimension 1 subcodes of Reed-Muller codes
- Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems
- Theoretical analysis of decoding failure rate of non-binary QC-MDPC codes
- A Comment on Niederreiter’s Public Key Cryptosystem
- Low-Reiter: Niederreiter encryption scheme for embedded microcontrollers
This page was built for publication: Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3569137)