Structural cryptanalysis of McEliece schemes with compact keys
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 4070796 (Why is no real title available?)
- scientific article; zbMATH DE number 4112524 (Why is no real title available?)
- scientific article; zbMATH DE number 3577144 (Why is no real title available?)
- scientific article; zbMATH DE number 1222357 (Why is no real title available?)
- scientific article; zbMATH DE number 2151220 (Why is no real title available?)
- scientific article; zbMATH DE number 967945 (Why is no real title available?)
- A Distinguisher for High-Rate McEliece Cryptosystems
- A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes
- A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
- A new efficient algorithm for computing Gröbner bases \((F_4)\)
- A probabilistic algorithm for computing minimum weights of large error-correcting codes
- Advances in cryptology -- EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 -- June 3, 2010. Proceedings
- Algebraic cryptanalysis of McEliece variants with compact keys
- An algorithm for finding the basis elements of the residue class ring of a zero dimensional polynomial ideal
- Attacking and Defending the McEliece Cryptosystem
- Compact McEliece keys based on quasi-dyadic Srivastava codes
- Compact McEliece keys from Goppa codes
- Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding
- Decoding random linear codes in \(\tilde{\mathcal{O}}(2^{0.054n})\)
- Efficient public key encryption based on ideal lattices (extended abstract)
- FGb: A Library for Computing Gröbner Bases
- Finding the permutation between equivalent linear codes: the support splitting algorithm
- Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups
- Goppa and related codes invariant under a prescribed permutation
- Implementation of McEliece based on quasi-dyadic Goppa codes for embedded devices
- Information-set decoding for linear codes over \(\mathbb F_q\)
- Monoidic codes in cryptography
- On ideal lattices and learning with errors over rings
- On the cyclicity of Goppa codes, parity-check subcodes of Goppa codes, and extended Goppa codes
- Quasi-dyadic CFS signatures
- Reducing Key Length of the McEliece Cryptosystem
- Security bounds for the design of code-based cryptosystems
- Smaller decoding exponents: ball-collision decoding
- Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension
- The Magma algebra system. I: The user language
- The algebraic decoding of Goppa codes
- Weak keys in the McEliece public-key cryptosystem
Cited in
(36)- Weak keys for the quasi-cyclic MDPC public key encryption scheme
- Designing a Public Key Cryptosystem Based on Quasi-cyclic Subspace Subcodes of Reed-Solomon Codes
- Weak keys in the Faure-Loidreau cryptosystem
- Computational aspects of retrieving a representation of an algebraic geometry code
- Square code attack on a modified Sidelnikov cryptosystem
- Code-based public-key cryptosystems and their applications
- Critical attacks in code-based cryptography
- The key space of the McEliece–Sidelnikov cryptosystem
- Security analysis of a cryptosystem based on subspace subcodes
- Cryptanalysis of a system based on twisted Reed-Solomon codes
- Two modifications for Loidreau's code-based cryptosystem
- Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension
- Cryptanalysis of schemes based on pseudoinverse matrix
- Algebraic attack against variants of McEliece with Goppa polynomial of a special form
- Reducing Key Length of the McEliece Cryptosystem
- A new approach based on quadratic forms to attack the McEliece cryptosystem
- Generalization of BJMM-ISD using May-Ozerov nearest neighbor algorithm over an arbitrary finite field \(\mathbb{F}_q\)
- Practical algebraic attack on DAGS
- Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and Their Subcodes
- Compact McEliece keys based on quasi-dyadic Srivastava codes
- Software implementation of a code-based key encapsulation mechanism from binary QD generalized Srivastava codes
- Compact McEliece keys from Goppa codes
- DAGS: key encapsulation using dyadic GS codes
- Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes
- Optimizing information set decoding algorithms to attack cyclosymmetric MDPC codes
- The McEliece-type cryptosystem based on \(D\)-codes
- Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes
- Reproducible families of codes and cryptographic applications
- Moderate classical McEliece keys from quasi-centrosymmetric Goppa codes
- Vulnerabilities of ``McEliece in the world of Escher
- Hardness estimates of the code equivalence problem in the rank metric
- Algebraic cryptanalysis of McEliece variants with compact keys
- Structural properties of self-dual monomial codes with application to code-based cryptography
- Differential power analysis of a McEliece cryptosystem
- Cryptanalysis of McEliece’s Public-Key Cryptosystem
- McEliece needs a break -- solving McEliece-1284 and quasi-cyclic-2918 with modern ISD
This page was built for publication: Structural cryptanalysis of McEliece schemes with compact keys
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q264131)