Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes
From MaRDI portal
Publication:3569137
DOI10.1007/978-3-642-12929-2_5zbMATH Open1284.94124OpenAlexW1488034582MaRDI QIDQ3569137FDOQ3569137
Authors: Christian Wieschebrink
Publication date: 17 June 2010
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-12929-2_5
Recommendations
- Public Key Cryptography - PKC 2006
- On the edge-independence number and edge-covering number for regular graphs
- Structural cryptanalysis of McEliece schemes with compact keys
- A note on the Sidelnikov-Shestakov attack of Niederreiter scheme
- Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes
generalized Reed-Solomon codeserror-correcting codesPublic key cryptographyNiederreiter encryptionSidelnikov-Shestakov attackMcEliece encryption
Cited In (53)
- How to avoid the Sidel'nikov-Shestakov attack
- Computational aspects of retrieving a representation of an algebraic geometry code
- A fault attack on the Niederreiter cryptosystem using binary irreducible Goppa codes
- Squares of matrix-product codes
- Enhanced public key security for the McEliece cryptosystem
- Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
- Automating the functional correspondence between higher-order evaluators and abstract machines
- The use of the direct sum decomposition algorithm for analyzing the strength of some McEliece-type cryptosystems
- On the structural security of a McEliece-type cryptosystem based on the sum of tensor products of binary Reed - Muller codes
- Encryption scheme based on expanded Reed-Solomon codes
- On the dimension of the subfield subcodes of 1-point Hermitian codes
- An improvement of the Niederreiter public-key cryptosystem by using dual public keys
- The non-gap sequence of a subcode of a generalized Reed-Solomon code
- Cryptanalysis of Ivanov-Krouk-Zyablov cryptosystem
- A graph-theoretical method for decoding some group MLD-codes
- Structural properties of self-dual monomial codes with application to code-based cryptography
- A secure and efficient code-based signature scheme
- Square code attack on a modified Sidelnikov cryptosystem
- On the unique representation of very strong algebraic geometry codes
- Title not available (Why is that?)
- A Subfield Lattice Attack on Overstretched NTRU Assumptions
- Code-based cryptosystems using generalized concatenated codes
- Security analysis of a cryptosystem based on subspace subcodes
- On linear codes with random multiplier vectors and the maximum trace dimension property
- The syndromes decoding algorithm in group codes
- Public Key Cryptography - PKC 2006
- The quadratic hull of a code and the geometric view on multiplication algorithms
- How to mask the structure of codes for a cryptographic use
- On ideals in group algebras: an uncertainty principle and the Schur product
- Cryptanalysis of a system based on twisted Reed-Solomon codes
- A note on the Sidelnikov-Shestakov attack of Niederreiter scheme
- Properties of constacyclic codes under the Schur product
- Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice
- Lossy cryptography from code-based assumptions
- On the Berger-Loidreau cryptosystem on the tensor product of codes
- Wild McEliece Incognito
- An attack on a non-interactive key exchange from code equivalence
- Cryptanalysis of the BBCRS system on Reed-Muller binary code
- Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes
- Classification of Hadamard products of one-codimensional subcodes of Reed-Muller codes
- Cryptanalysis of the McEliece public key cryptosystem based on polar codes
- On the dimension and structure of the square of the dual of a Goppa code
- A novel Niederreiter-like cryptosystem based on the \((u|u + \upsilon)\)-construction codes
- Estimating the dimension of the subfield subcodes of Hermitian codes
- A Hadamard product of linear codes: algebraic properties and algorithms for calculating it
- Complete classification of Hadamard products of codimension 1 subcodes of Reed-Muller codes
- Theoretical analysis of decoding failure rate of non-binary QC-MDPC codes
- Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems
- Broadcast attacks against code-based schemes
- A Comment on Niederreiter’s Public Key Cryptosystem
- Low-Reiter: Niederreiter encryption scheme for embedded microcontrollers
- Vulnerabilities of ``McEliece in the world of Escher
- Distinguishing and recovering generalized linearized Reed-Solomon codes
This page was built for publication: Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3569137)