A Summary of McEliece-Type Cryptosystems and their Security
From MaRDI portal
Publication:5295348
DOI10.1515/JMC.2007.009zbMath1278.94047OpenAlexW2001123117MaRDI QIDQ5295348
Arthur Schmidt, R. Overbeck, D. Engelbert
Publication date: 27 July 2007
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/jmc.2007.009
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Linear codes (general theory) (94B05) Cryptography (94A60) Data encryption (aspects in computer science) (68P25)
Related Items (11)
On the security of the Courtois-Finiasz-Sendrier signature ⋮ Using low-density parity-check codes to improve the McEliece cryptosystem ⋮ Breaking Goppa-based McEliece with hints ⋮ Decoding McEliece with a hint -- secret Goppa key parts reveal everything ⋮ Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes ⋮ Attacking and Defending the McEliece Cryptosystem ⋮ Side Channels in the McEliece PKC ⋮ Code-Based Public-Key Cryptosystems and Their Applications ⋮ Semantic security for the McEliece cryptosystem without random oracles ⋮ Reducing Key Length of the McEliece Cryptosystem ⋮ Computer algebra tales on Goppa codes and McEliece cryptography
Uses Software
Cites Work
- Unnamed Item
- Shrinking generators and statistical leakage
- McEliece public key cryptosystems using algebraic-geometric codes
- Reducible rank codes and their applications to cryptography
- On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC
- Solving low-density subset sum problems
- A probabilistic algorithm for computing minimum weights of large error-correcting codes
- The algebraic decoding of Goppa codes
- On the inherent intractability of certain coding problems (Corresp.)
- On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
- On the Dimension of the Hull
- Parameters of Goppa codes revisited
- A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
- Finding the permutation between equivalent linear codes: the support splitting algorithm
- Weak keys in the McEliece public-key cryptosystem
- Cryptanalysis: a survey of recent results
This page was built for publication: A Summary of McEliece-Type Cryptosystems and their Security