Computer algebra tales on Goppa codes and McEliece cryptography
From MaRDI portal
Publication:782704
DOI10.1007/s11786-019-00444-1zbMath1456.94139OpenAlexW2996308178WikidataQ114688589 ScholiaQ114688589MaRDI QIDQ782704
Narcís Sayols, Sebastian Xambó-Descamps
Publication date: 28 July 2020
Published in: Mathematics in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11786-019-00444-1
Symbolic computation and algebraic computation (68W30) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Decoding (94B35) Theory of error-correcting codes and error-detecting codes (94Bxx)
Related Items (2)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Asymptotically faster quantum algorithms to solve multivariate quadratic equations
- Ouroboros: a simple, secure and efficient key exchange protocol based on coding theory
- A low-resource quantum factoring algorithm
- Block error-correcting codes. A computational primer
- On PGZ decoding of alternant codes
- On the Complexity of the Rank Syndrome Decoding Problem
- Wild McEliece Incognito
- A polynomial-time algorithm for breaking the basic Merkle - Hellman cryptosystem
- Attacking and Defending the McEliece Cryptosystem
- Introduction to post-quantum cryptography
- Code-based cryptography
- New directions in cryptography
- Efficient generation of random nonsingular matrices
- The algebraic decoding of Goppa codes
- A method for obtaining digital signatures and public-key cryptosystems
- On the inherent intractability of certain coding problems (Corresp.)
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Efficient generation of binary words of given weight
- Compact McEliece keys based on quasi-dyadic Srivastava codes
- Overview of the Mceliece Cryptosystem and its Security
- McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks
- A Summary of McEliece-Type Cryptosystems and their Security
- A Class of Error-Correcting Codes in $p^m $ Symbols
- Encoding and error-correction procedures for the Bose-Chaudhuri codes
- Hiding information and signatures in trapdoor knapsacks
This page was built for publication: Computer algebra tales on Goppa codes and McEliece cryptography