scientific article; zbMATH DE number 3989251
From MaRDI portal
Publication:3752293
zbMATH Open0611.94007MaRDI QIDQ3752293FDOQ3752293
Authors: Harald Niederreiter
Publication date: 1986
Title of this publication is not available (Why is that?)
Recommendations
- Knapsack public key cryptosystems and Diophantine approximation
- scientific article; zbMATH DE number 4087587
- scientific article; zbMATH DE number 4033660
- On the Chor-Rivest knapsack cryptosystem
- On some cryptosystems based on algebraic codes
- scientific article
- A knapsack-type public key cryptosystem based on arithmetic in finite fields
- COMBINATORIAL OPTIMIZATION AND THE KNAPSACK CIPHER
- Nonassociative algebraic structures in cryptography and coding
Cited In (only showing first 100 items - show all)
- Identity based identification from algebraic coding theory
- A code-based signature scheme from the Lyubashevsky framework
- Title not available (Why is that?)
- Variant of Niederreiter-based signature scheme for blockchain technology
- Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme
- A unified approach to deterministic encryption: new constructions and a connection to computational entropy
- Dihedral codes with prescribed minimum distance
- A knapsack-type public key cryptosystem based on arithmetic in finite fields
- A framework for cryptographic problems from linear algebra
- Enhanced public key security for the McEliece cryptosystem
- On quaternary Goppa codes
- Title not available (Why is that?)
- Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
- Two attacks on rank metric code-based schemes: RankSign and an IBE scheme
- Code-Based Signature Schemes from Identification Protocols in the Rank Metric
- Parallel-CFS
- ECC\(^2\): error correcting code and elliptic curve based cryptosystem
- Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes
- A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes
- Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem
- Lattice polly cracker cryptosystems
- A new post-quantum multivariate polynomial public key encapsulation algorithm
- Quadratic compact knapsack public-key cryptosystem
- Generalization of BJMM-ISD using May-Ozerov nearest neighbor algorithm over an arbitrary finite field \(\mathbb{F}_q\)
- Encryption scheme based on expanded Reed-Solomon codes
- On Linear Complexity of Finite Sequences: Coding Theory and Applications to Cryptography
- The non-gap sequence of a subcode of a generalized Reed-Solomon code
- Monoidic codes in cryptography
- Cryptanalysis of Ivanov-Krouk-Zyablov cryptosystem
- On checkable codes in group algebras
- Designing a Public Key Cryptosystem Based on Quasi-cyclic Subspace Subcodes of Reed-Solomon Codes
- Mathematical problems in cryptology
- More constructions of lossy and correlation-secure trapdoor functions
- A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory
- A NP-complete problem in coding theory with application to code based cryptography
- Square code attack on a modified Sidelnikov cryptosystem
- Efficient implementation of hybrid encryption from coding theory
- Key-recovery fault injection attack on the classic McEliece KEM
- On the unique representation of very strong algebraic geometry codes
- Efficient generation of binary words of given weight
- Security analysis of a cryptosystem based on subspace subcodes
- Quantum-assisted QD-CFS signatures
- Fast polynomial inversion for post quantum QC-MDPC cryptography
- List Decoding for Binary Goppa Codes
- Wild McEliece
- On the security of the Courtois-Finiasz-Sendrier signature
- Cryptanalysis of a system based on twisted Reed-Solomon codes
- A survey of some applications of finite fields
- Properties of constacyclic codes under the Schur product
- A code-based hybrid signcryption scheme
- Decoding one out of many
- A knapsack-based probabilistic encryption scheme
- Wild McEliece Incognito
- Attacking and Defending the McEliece Cryptosystem
- Computer algebra tales on Goppa codes and McEliece cryptography
- Reducing Key Length of the McEliece Cryptosystem
- Inner-product functional encryption from random linear codes: trial and challenges
- Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes
- A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting
- On weak keys and forgery attacks against polynomial-based MAC schemes
- Invertible matrices over some quotient rings: identification, generation, and analysis
- Goppa codes over the \(p\)-adic integers and integers modulo \(p^e\)
- Semantic security for the McEliece cryptosystem without random oracles
- Cryptanalysis of LEDAcrypt
- On quasi-cyclic codes as a generalization of cyclic codes
- Post-quantum key exchange for the Internet and the open quantum safe project
- Bounded distance decoding of linear error-correcting codes with Gröbner bases
- Joint Source-Cryptographic-Channel Coding Based on Linear Block Codes
- Computational aspects of retrieving a representation of an algebraic geometry code
- A knapsack-like code using recurrence sequence representations
- A fault attack on the Niederreiter cryptosystem using binary irreducible Goppa codes
- Niederreiter cryptosystems using quasi-cyclic codes that resist quantum Fourier sampling
- A new algorithm for finding minimum-weight words in large linear codes
- ABOUT THE CONP-COMPLETE “INJECTIVE KNAPSACK” PROBLEM
- On two modifications of the McEliece PKE and the CFS signature scheme
- Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures
- Exploring decryption failures of BIKE: new class of weak keys and key recovery attacks
- Title not available (Why is that?)
- Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model
- On the Key-Privacy Issue of McEliece Public-Key Encryption
- SPANSE: combining sparsity with density for efficient one-time code-based digital signatures
- An algorithm for generalized syndrome decoding problem
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
- On the structural security of a McEliece-type cryptosystem based on the sum of tensor products of binary Reed - Muller codes
- The security of the code-based signature scheme based on the Stern identification protocol
- The McEliece-type cryptosystem based on \(D\)-codes
- Two modifications for Loidreau's code-based cryptosystem
- Algorithm 1033: parallel implementations for computing the minimum distance of a random linear code on distributed-memory architectures
- A generalization of NTRUEncrypt
- On some cryptosystems based on algebraic codes
- Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems
- A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial
- A secure and efficient code-based signature scheme
- Estimates of the neighborhood volumes of binary codes via their weight spectra
- Skew differential Goppa codes and their application to McEliece cryptosystem
- Code-based cryptosystems using generalized concatenated codes
- Moderate classical McEliece keys from quasi-centrosymmetric Goppa codes
- A new McEliece-type cryptosystem using Gabidulin-Kronecker product codes
- On the hardness of the Lee syndrome decoding problem
- Cryptanalysis and repair of a Gabidulin code based cryptosystem from ACISP 2018
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3752293)