On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
From MaRDI portal
Publication:4307309
Recommendations
- Publication:3202943
- scientific article; zbMATH DE number 2154508
- scientific article; zbMATH DE number 4070796
- scientific article; zbMATH DE number 6001304
- On the equivalent keys in multivariate cryptosystems
- A Comment on Niederreiter’s Public Key Cryptosystem
- Cryptanalysis of McEliece’s Public-Key Cryptosystem
- The number of public keys in the McEliece-Sidel'nikov cryptosystem
- scientific article; zbMATH DE number 177617
Cited in
(26)- scientific article; zbMATH DE number 177617 (Why is no real title available?)
- A code-based signature scheme from the Lyubashevsky framework
- Computational aspects of retrieving a representation of an algebraic geometry code
- Joint Source-Cryptographic-Channel Coding Based on Linear Block Codes
- Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme
- Amount of key information contained in plain and encrypted text sets of the symmetric randomized McEliece cryptosystem
- Hash-based signatures revisited: a dynamic FORS with adaptive chosen message security
- Extended multivariate public key cryptosystems with secure encryption function
- Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes
- Secure message authentication against related-key attack
- A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes
- On the dimension of the subfield subcodes of 1-point Hermitian codes
- Two modifications for Loidreau's code-based cryptosystem
- The non-gap sequence of a subcode of a generalized Reed-Solomon code
- A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory
- Code-based cryptosystems using generalized concatenated codes
- A Summary of McEliece-Type Cryptosystems and their Security
- Wild McEliece
- MODRED: a code-based non-interactive key exchange protocol
- A survey of some applications of finite fields
- The relationship between structure of the key space and hardness of the McEliece-Sidelnikov public key cryptosystem
- Attacking and Defending the McEliece Cryptosystem
- Reducing Key Length of the McEliece Cryptosystem
- Basics of secrecy coding
- Semantic security for the McEliece cryptosystem without random oracles
- On quasi-cyclic codes as a generalization of cyclic codes
This page was built for publication: On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4307309)