scientific article; zbMATH DE number 3989251
From MaRDI portal
Publication:3752293
zbMATH Open0611.94007MaRDI QIDQ3752293FDOQ3752293
Publication date: 1986
Title of this publication is not available (Why is that?)
Recommendations
- Knapsack public key cryptosystems and Diophantine approximation
- scientific article
- scientific article
- On the Chor-Rivest knapsack cryptosystem
- On some cryptosystems based on algebraic codes
- scientific article
- A knapsack-type public key cryptosystem based on arithmetic in finite fields
- COMBINATORIAL OPTIMIZATION AND THE KNAPSACK CIPHER
- Nonassociative algebraic structures in cryptography and coding
Cited In (only showing first 100 items - show all)
- Identity based identification from algebraic coding theory
- A code-based signature scheme from the Lyubashevsky framework
- Title not available (Why is that?)
- Variant of Niederreiter-based signature scheme for blockchain technology
- Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme
- A unified approach to deterministic encryption: new constructions and a connection to computational entropy
- Generalization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field $$\mathbb {F}_q$$
- Dihedral codes with prescribed minimum distance
- Decoding One Out of Many
- A knapsack-type public key cryptosystem based on arithmetic in finite fields
- A framework for cryptographic problems from linear algebra
- Enhanced public key security for the McEliece cryptosystem
- On quaternary Goppa codes
- Cryptanalysis of Public-Key Cryptosystems That Use Subcodes of Algebraic Geometry Codes
- Title not available (Why is that?)
- Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
- Two attacks on rank metric code-based schemes: RankSign and an IBE scheme
- Code-Based Signature Schemes from Identification Protocols in the Rank Metric
- Parallel-CFS
- ECC\(^2\): error correcting code and elliptic curve based cryptosystem
- A NP-Complete Problem in Coding Theory with Application to Code Based Cryptography
- Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes
- Efficient Implementation of Hybrid Encryption from Coding Theory
- A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes
- Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem
- Lattice polly cracker cryptosystems
- A new post-quantum multivariate polynomial public key encapsulation algorithm
- On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes
- Quadratic compact knapsack public-key cryptosystem
- Encryption scheme based on expanded Reed-Solomon codes
- On Linear Complexity of Finite Sequences: Coding Theory and Applications to Cryptography
- The non-gap sequence of a subcode of a generalized Reed-Solomon code
- Cryptanalysis of Ivanov-Krouk-Zyablov cryptosystem
- On checkable codes in group algebras
- Designing a Public Key Cryptosystem Based on Quasi-cyclic Subspace Subcodes of Reed-Solomon Codes
- Mathematical problems in cryptology
- More constructions of lossy and correlation-secure trapdoor functions
- A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory
- Key-recovery fault injection attack on the classic McEliece KEM
- On the unique representation of very strong algebraic geometry codes
- Efficient generation of binary words of given weight
- Security analysis of a cryptosystem based on subspace subcodes
- Quantum-assisted QD-CFS signatures
- Fast polynomial inversion for post quantum QC-MDPC cryptography
- List Decoding for Binary Goppa Codes
- Wild McEliece
- On the security of the Courtois-Finiasz-Sendrier signature
- Cryptanalysis of a system based on twisted Reed-Solomon codes
- A survey of some applications of finite fields
- Monoidic Codes in Cryptography
- Properties of constacyclic codes under the Schur product
- A code-based hybrid signcryption scheme
- Square Code Attack on a Modified Sidelnikov Cryptosystem
- A knapsack-based probabilistic encryption scheme
- Wild McEliece Incognito
- Attacking and Defending the McEliece Cryptosystem
- Computer algebra tales on Goppa codes and McEliece cryptography
- Reducing Key Length of the McEliece Cryptosystem
- Inner-product functional encryption from random linear codes: trial and challenges
- A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting
- Invertible matrices over some quotient rings: identification, generation, and analysis
- Goppa codes over the \(p\)-adic integers and integers modulo \(p^e\)
- Semantic security for the McEliece cryptosystem without random oracles
- Cryptanalysis of LEDAcrypt
- On quasi-cyclic codes as a generalization of cyclic codes
- Post-quantum key exchange for the Internet and the open quantum safe project
- Bounded distance decoding of linear error-correcting codes with Gröbner bases
- Joint Source-Cryptographic-Channel Coding Based on Linear Block Codes
- Computational aspects of retrieving a representation of an algebraic geometry code
- Оценки объемов окрестностей двоичных кодов в терминах их весовых спектров
- A fault attack on the Niederreiter cryptosystem using binary irreducible Goppa codes
- Niederreiter cryptosystems using quasi-cyclic codes that resist quantum Fourier sampling
- A new algorithm for finding minimum-weight words in large linear codes
- Code-Based Cryptosystems Using Generalized Concatenated Codes
- ABOUT THE CONP-COMPLETE “INJECTIVE KNAPSACK” PROBLEM
- On two modifications of the McEliece PKE and the CFS signature scheme
- A Secure and Efficient Code-Based Signature Scheme
- Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures
- Exploring decryption failures of BIKE: new class of weak keys and key recovery attacks
- Title not available (Why is that?)
- Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model
- On the Key-Privacy Issue of McEliece Public-Key Encryption
- SPANSE: combining sparsity with density for efficient one-time code-based digital signatures
- An algorithm for generalized syndrome decoding problem
- Quantum Resistant Public Key Encryption Scheme polarRLCE
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
- On the structural security of a McEliece-type cryptosystem based on the sum of tensor products of binary Reed - Muller codes
- The security of the code-based signature scheme based on the Stern identification protocol
- The McEliece-type cryptosystem based on \(D\)-codes
- Two modifications for Loidreau's code-based cryptosystem
- Algorithm 1033: parallel implementations for computing the minimum distance of a random linear code on distributed-memory architectures
- A generalization of NTRUEncrypt
- Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems
- A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial
- A Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codes
- Skew differential Goppa codes and their application to McEliece cryptosystem
- Moderate classical McEliece keys from quasi-centrosymmetric Goppa codes
- A new McEliece-type cryptosystem using Gabidulin-Kronecker product codes
- On the hardness of the Lee syndrome decoding problem
- Cryptanalysis and repair of a Gabidulin code based cryptosystem from ACISP 2018
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3752293)