Decoding One Out of Many

From MaRDI portal
Publication:3102783

DOI10.1007/978-3-642-25405-5_4zbMath1290.94167OpenAlexW1872498068MaRDI QIDQ3102783

Nicolas Sendrier

Publication date: 25 November 2011

Published in: Post-Quantum Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-25405-5_4




Related Items (27)

About Low DFR for QC-MDPC DecodingSquaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimensionA digital signature scheme $\mathrm{mCFS}^{\mathrm{QC{-}LDPC}}$ based on $\mathrm{QC}$-$\mathrm{LDPC}$ codesA Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding TheoryPerformance bounds for QC-MDPC codes decodersMcEliece needs a break -- solving McEliece-1284 and quasi-cyclic-2918 with modern ISDSyndrome Decoding EstimatorSecure Message Authentication Against Related-Key AttackCompact post-quantum signatures from proofs of knowledge leveraging structure for the \textsf{PKP, SD} and \textsf{RSD} problemsModerate classical McEliece keys from quasi-centrosymmetric Goppa codesOn codes and learning with errors over function fieldsInterleaved Prange: a new generic decoder for interleaved codesA Key Recovery Attack on MDPC with CCA Security Using Decoding ErrorsImproved information set decoding algorithms over Galois ring in the Lee metricAnalysis of (U,U+V)-code problem with Gramian over binary and ternary fieldsNon-interactive secure computation of inner-product from LPN and LWEExploring decryption failures of BIKE: new class of weak keys and key recovery attacksA new key recovery side-channel attack on HQC with chosen ciphertextLifting standard model reductions to common setup assumptionsA code-based hybrid signcryption schemeReproducible families of codes and cryptographic applicationsUpper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexityTinyKeys: a new approach to efficient multi-party computationTight and optimal reductions for signatures based on average trapdoor preimage sampleable functions and applications to code-based signaturesAn Efficient Attack on All Concrete KKS ProposalsCryptanalysis of LEDAcryptRank-Metric Codes and Their Applications


Uses Software


Cites Work


This page was built for publication: Decoding One Out of Many