Security Bounds for the Design of Code-Based Cryptosystems

From MaRDI portal
Publication:3650687

DOI10.1007/978-3-642-10366-7_6zbMath1267.94058OpenAlexW1897146492MaRDI QIDQ3650687

Matthieu Finiasz, Nicolas Sendrier

Publication date: 15 December 2009

Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_6




Related Items (47)

Structural cryptanalysis of McEliece schemes with compact keysInformation set decoding in the Lee metric with applications to cryptographySilver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codesImproved Information Set Decoding for Code-Based Cryptosystems with Constrained MemoryStructural properties of self-dual monomial codes with application to code-based cryptographyGeneralization of the Ball-Collision AlgorithmA Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding TheoryEfficient Code Based Hybrid and Deterministic Encryptions in the Standard ModelA rank metric code-based group signature schemeSyndrome Decoding EstimatorImproved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x\) and some cryptographic applications] ⋮ Pseudorandom correlation functions from variable-density LPN, revisitedA new algebraic approach to the regular syndrome decoding problem and implications for PCG constructionsThe return of the SDitHOn the hardness of the Lee syndrome decoding problemCode-Based Signature Schemes from Identification Protocols in the Rank MetricA code-based signature scheme from the Lyubashevsky frameworkAn algorithm for generalized syndrome decoding problemImproved information set decoding algorithms over Galois ring in the Lee metricCorrelated pseudorandomness from expand-accumulate codesStatistical decoding 2.0: reducing decoding to LPNCorrelated pseudorandomness from the hardness of quasi-abelian decodingSide channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementationComputational aspects of retrieving a representation of an algebraic geometry codeImproved combinatorial algorithms for the inhomogeneous short integer solution problemPublic key compression for constrained linear signature schemesQuantum-assisted QD-CFS signaturesDesigning a Public Key Cryptosystem Based on Quasi-cyclic Subspace Subcodes of Reed-Solomon CodesQuantum Resistant Public Key Encryption Scheme polarRLCEFaster 2-Regular Information-Set DecodingA code-based group signature schemeAn algorithmic framework for the generalized birthday problemTinyKeys: a new approach to efficient multi-party computationGeneralization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field $$\mathbb {F}_q$$Code-Based Public-Key Cryptosystems and Their ApplicationsInterpreting Hash Function Security ProofsA Secure and Efficient Code-Based Signature SchemeZero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256Wild McElieceParallel-CFSTight and optimal reductions for signatures based on average trapdoor preimage sampleable functions and applications to code-based signaturesFull Cryptanalysis of the Chen Identification ProtocolDecoding One Out of ManyAn Efficient Attack on All Concrete KKS ProposalsMonoidic Codes in CryptographyUnnamed ItemCryptanalysis of the binary permuted kernel problem




This page was built for publication: Security Bounds for the Design of Code-Based Cryptosystems