Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Reducing Key Length of the McEliece Cryptosystem - MaRDI portal

Reducing Key Length of the McEliece Cryptosystem

From MaRDI portal
Publication:3637133

DOI10.1007/978-3-642-02384-2_6zbMath1246.94022OpenAlexW1520077026WikidataQ62039177 ScholiaQ62039177MaRDI QIDQ3637133

Pierre-Louis Cayrel, Ayoub Otmani, Philippe Gaborit, Thierry P. Berger

Publication date: 7 July 2009

Published in: Progress in Cryptology – AFRICACRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-02384-2_6




Related Items (36)

Structural cryptanalysis of McEliece schemes with compact keysReducing the Key Size of Rainbow Using Non-commutative RingsNew Variant of the McEliece CryptosystemBasics of Secrecy CodingNon-binary irreducible quasi-cyclic parity-check subcodes of Goppa codes and extended Goppa codesSecurity analysis of a cryptosystem based on subspace subcodesECC\(^2\): error correcting code and elliptic curve based cryptosystemProperties of constacyclic codes under the Schur productWeaknesses in Two RFID Authentication ProtocolsSquare Code Attack on a Modified Sidelnikov CryptosystemNiederreiter cryptosystems using quasi-cyclic codes that resist quantum Fourier samplingModerate classical McEliece keys from quasi-centrosymmetric Goppa codesCode-Based Signature Schemes from Identification Protocols in the Rank MetricA post-quantum hybrid encryption based on QC-LDPC codes in the multi-user settingTwo classes of quasi-cyclic codes via irreducible polynomialsThe syndromes decoding algorithm in group codesOn new problems in asymmetric cryptography based on error-resistant codingSoftware implementation of a code-based key encapsulation mechanism from binary QD generalized Srivastava codesA code-based hybrid signcryption schemeComputational aspects of retrieving a representation of an algebraic geometry codeQuantum Cryptography: Key Distribution and BeyondDesigning a Public Key Cryptosystem Based on Quasi-cyclic Subspace Subcodes of Reed-Solomon CodesDihedral codes with prescribed minimum distanceReproducible families of codes and cryptographic applicationsDAGS: key encapsulation using dyadic GS codesGeneralization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field $$\mathbb {F}_q$$A NP-Complete Problem in Coding Theory with Application to Code Based CryptographyCode-Based Public-Key Cryptosystems and Their ApplicationsOn quasi-cyclic codes as a generalization of cyclic codesA Multivariate Encryption Scheme with RainbowWild McElieceA Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding ProblemMonoidic Codes in CryptographyStatistical Decoding of Codes over $\mathbb{F}_q$Cryptanalysis of a system based on twisted Reed-Solomon codesOn checkable codes in group algebras


Uses Software


Cites Work


This page was built for publication: Reducing Key Length of the McEliece Cryptosystem