scientific article

From MaRDI portal
Publication:3752293

zbMath0611.94007MaRDI QIDQ3752293

Harald Niederreiter

Publication date: 1986


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Enhanced public key security for the McEliece cryptosystem, Two attacks on rank metric code-based schemes: RankSign and an IBE scheme, On the security of the Courtois-Finiasz-Sendrier signature, Cryptanalysis of Public-Key Cryptosystems That Use Subcodes of Algebraic Geometry Codes, A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory, Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model, Mathematical problems in cryptology, Security analysis of a cryptosystem based on subspace subcodes, ECC\(^2\): error correcting code and elliptic curve based cryptosystem, ON SOME CRYPTOSYSTEMS BASED ON ALGEBRAIC CODES, Properties of constacyclic codes under the Schur product, On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes, Square Code Attack on a Modified Sidelnikov Cryptosystem, Identity based identification from algebraic coding theory, Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes, Niederreiter cryptosystems using quasi-cyclic codes that resist quantum Fourier sampling, The non-gap sequence of a subcode of a generalized Reed-Solomon code, Moderate classical McEliece keys from quasi-centrosymmetric Goppa codes, Skew differential Goppa codes and their application to McEliece cryptosystem, On the hardness of the Lee syndrome decoding problem, Graphic lattices made by graph felicitous-type labelings and colorings of topological coding, Code-Based Signature Schemes from Identification Protocols in the Rank Metric, A code-based signature scheme from the Lyubashevsky framework, A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting, Cryptanalysis and repair of a Gabidulin code based cryptosystem from ACISP 2018, An algorithm for generalized syndrome decoding problem, Hardness estimates of the code equivalence problem in the rank metric, Improved information set decoding algorithms over Galois ring in the Lee metric, Key-recovery fault injection attack on the classic McEliece KEM, Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes, Retracted: Invertible matrices over some quotient rings: identification, generation, and analysis, Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures, Exploring decryption failures of BIKE: new class of weak keys and key recovery attacks, The syndromes decoding algorithm in group codes, Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates, On the equivalence of two post-quantum cryptographic families, Cryptanalysis of Ivanov-Krouk-Zyablov cryptosystem, A code-based hybrid signcryption scheme, Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems, Post-quantum key exchange for the Internet and the open quantum safe project, A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial, A new McEliece-type cryptosystem using Gabidulin-Kronecker product codes, Lattice polly cracker cryptosystems, More constructions of lossy and correlation-secure trapdoor functions, A survey of some applications of finite fields, Efficient generation of binary words of given weight, A new algorithm for finding minimum-weight words in large linear codes, On the unique representation of very strong algebraic geometry codes, Inner-product functional encryption from random linear codes: trial and challenges, Computational aspects of retrieving a representation of an algebraic geometry code, Code-Based Cryptosystems Using Generalized Concatenated Codes, Attacking and Defending the McEliece Cryptosystem, A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes, Joint Source-Cryptographic-Channel Coding Based on Linear Block Codes, On the Key-Privacy Issue of McEliece Public-Key Encryption, Quantum-assisted QD-CFS signatures, Designing a Public Key Cryptosystem Based on Quasi-cyclic Subspace Subcodes of Reed-Solomon Codes, Quantum Resistant Public Key Encryption Scheme polarRLCE, Dihedral codes with prescribed minimum distance, List Decoding for Binary Goppa Codes, ABOUT THE CONP-COMPLETE “INJECTIVE KNAPSACK” PROBLEM, Generalization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field $$\mathbb {F}_q$$, A NP-Complete Problem in Coding Theory with Application to Code Based Cryptography, Efficient Implementation of Hybrid Encryption from Coding Theory, On quasi-cyclic codes as a generalization of cyclic codes, A framework for cryptographic problems from linear algebra, Encryption scheme based on expanded Reed-Solomon codes, Asymmetric code-theoretical schemes constructed with the use of algebraic geometric codes, A Secure and Efficient Code-Based Signature Scheme, Bounded distance decoding of linear error-correcting codes with Gröbner bases, Оценки объемов окрестностей двоичных кодов в терминах их весовых спектров, A unified approach to deterministic encryption: new constructions and a connection to computational entropy, Semantic security for the McEliece cryptosystem without random oracles, Wild McEliece, Parallel-CFS, Fast polynomial inversion for post quantum QC-MDPC cryptography, Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem, Reducing Key Length of the McEliece Cryptosystem, Decoding One Out of Many, Monoidic Codes in Cryptography, Wild McEliece Incognito, On quaternary Goppa codes, Variant of Niederreiter-based signature scheme for blockchain technology, Cryptanalysis of a system based on twisted Reed-Solomon codes, Invertible matrices over some quotient rings: identification, generation, and analysis, Goppa codes over the \(p\)-adic integers and integers modulo \(p^e\), Computer algebra tales on Goppa codes and McEliece cryptography, Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme, Cryptanalysis of LEDAcrypt, A new post-quantum multivariate polynomial public key encapsulation algorithm, On checkable codes in group algebras, A Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codes, On the structural security of a McEliece-type cryptosystem based on the sum of tensor products of binary Reed - Muller codes, The security of the code-based signature scheme based on the Stern identification protocol