Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes

From MaRDI portal
Publication:398980

DOI10.1007/s10623-014-9967-zzbMath1310.94138arXiv1307.6458OpenAlexW2111444563WikidataQ62039163 ScholiaQ62039163MaRDI QIDQ398980

Valérie Gauthier-Umaña, Alain Couvreur, Jean-Pierre Tillich, Ayoub Otmani, Philippe Gaborit

Publication date: 18 August 2014

Published in: Designs, Codes and Cryptography (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/1307.6458




Related Items (25)

Enhanced public key security for the McEliece cryptosystemThe quadratic hull of a code and the geometric view on multiplication algorithmsCryptanalysis of Public-Key Cryptosystems That Use Subcodes of Algebraic Geometry CodesStructural properties of self-dual monomial codes with application to code-based cryptographyPolynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codesMDS and near-MDS codes via twisted Reed-Solomon codesPerformance bounds for QC-MDPC codes decodersOn ideals in group algebras: an uncertainty principle and the Schur productProperties of constacyclic codes under the Schur productSquare Code Attack on a Modified Sidelnikov CryptosystemRevisiting algebraic attacks on MinRank and on the rank decoding problemA class of double-twisted generalized Reed-Solomon codesThe syndromes decoding algorithm in group codesA side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomialOn linear codes with random multiplier vectors and the maximum trace dimension propertyOn the security of a Loidreau rank metric code based encryption schemeA new McEliece-type cryptosystem using Gabidulin-Kronecker product codesOn the dimension and structure of the square of the dual of a Goppa codeDesigning a Public Key Cryptosystem Based on Quasi-cyclic Subspace Subcodes of Reed-Solomon CodesQuantum Resistant Public Key Encryption Scheme polarRLCEAPPLICATION OF ONE METHOD OF LINEAR CODE RECOGNITION TO THE WIRE-TAP CHANNELEncryption scheme based on expanded Reed-Solomon codesCryptanalysis of a system based on twisted Reed-Solomon codesClassification of Hadamard products of one-codimensional subcodes of Reed-Muller codesOn the structural security of a McEliece-type cryptosystem based on the sum of tensor products of binary Reed - Muller codes


Uses Software


Cites Work


This page was built for publication: Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes