Code-Based Public-Key Cryptosystems and Their Applications
From MaRDI portal
Publication:4931667
DOI10.1007/978-3-642-14496-7_5zbMath1282.94052MaRDI QIDQ4931667
Publication date: 29 September 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-14496-7_5
94A60: Cryptography
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes
- Semantic security for the McEliece cryptosystem without random oracles
- List Decoding for Binary Goppa Codes
- On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC
- A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
- Reducing Key Length of the McEliece Cryptosystem
- Security Bounds for the Design of Code-Based Cryptosystems
- Compact McEliece Keys from Goppa Codes
- On extending Goppa codes to cyclic codes (Corresp.)
- A new identification scheme based on syndrome decoding
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- A Summary of McEliece-Type Cryptosystems and their Security
- Authenticating Pervasive Devices with Human Protocols
- Oblivious Transfer Based on the McEliece Assumptions
- Coding-Based Oblivious Transfer