Documents
Authors
Tables
Documents:
Advanced Search
Include Citations
Authors:
Advanced Search
Include Citations
Tables:
DMCA
Implementational aspects of code-based cryptography (2010)
Cached
Download Links
[pastel.archives-ouvertes.fr]
[pastel.archives-ouvertes.fr]
Save to List
Add to Collection
Correct Errors
Monitor Changes
by Bhaskar Biswas
Summary
Citations
Active Bibliography
Co-citation
Clustered Documents
Version History
Citations
3870
A method for obtaining digital signatures and public-key cryptosystems
- Rivest, Shamir, et al. - 1978
2632
Theory of Error Correcting Codes
- MacWilliams, Sloane - 1977
1260
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Shor - 1997
1003
Elliptic curve cryptosystems.
- Koblitz - 1987
812
Finite fields
- Lidl, Niederreiter - 1997
582
Algebraic Coding Theory
- Berlekamp - 1968
545
zur Gathen and
- von - 2003
318
Tilborg, “On the inherent intractability of certain coding problems (corresp
- Berlekamp, McEliece, et al. - 1978
293
A public-key cryptosystem based on algebraic coding theory
- Mceliece - 1978
290
New directions in cryptography
- Die, Hellman - 1976
193
Abstract Algebra
- Herstein - 1986
176
Hiding information and signatures in trapdoor knapsacks
- Merkle, Member, et al. - 1978
172
Finite Fields, Encyclopedia of Mathematics and its applications 20, 2nd edition
- Lidl, Niederreiter - 1997
90
Enumerative source encoding
- Cover - 1973
67
Attacking and Defending the McEliece Cryptosystem
- Bernstein, Lange, et al. - 2008
63
A probabilistic algorithm for computing minimum weights of large error-correcting codes
- Leon - 1988
62
An observation on the security of McEliece’s public-key cryptosystem, in
- Lee, Brickell - 1988
59
Cyclic Decoding Procedures for Bose-Chaudhuri-Hocquenghem Codes
- Chien - 1964
51
Security Bounds for the Design of Code-Based Cryptosystems, in
- Finiasz, Sendrier - 2009
49
A knapsack-type public key cryptosystem based on arithmetic in nite elds
- Chor, Rivest - 1988
47
On cryptosystem based on generalized ReedSolomon codes. Discrete mathematics (in russian
- Sidel'nikov, Shestakov - 1992
45
Compact mceliece keys from goppa codes
- Misoczki, Barreto - 2009
43
Chosen-ciphertext security for any one-way cryptosystem
- Pointcheval - 2000
42
Algebraic Cryptanalysis of McEliece Variants with Compact Keys
- Faugère, Otmani, et al. - 2010
42
The algebraic decoding of Goppa codes
- Patterson - 1975
41
Bit-serial reed - solomon encoders
- Berlekamp - 1982
30
Reaction attacks against several public-key cryptosystems
- Hall, Goldberg, et al. - 1999
30
Vlsi architectures for computing multiplications and inverses in gf(2m
- Wang, Shao, et al. - 1985
29
Weak keys in the McEliece public-key cryptosystem
- Loidreau, Sendrier - 2001
28
Complexity issues in coding theory
- Barg - 1998
28
Cryptanalysis of the original McEliece cryptosystem
- Canteaut, Sendrier - 1998
27
Semantically secure McEliece public-key cryptosystems - Conversions for McEliece PKC
- Kobara, Imai
26
Failure of the mceliece public-key cryptosystem under message-resend and related-message attack
- Berson - 1997
26
A new class of linear error-correcting codes
- Goppa - 1970
25
Security-related comments regarding McEliece's publickey cryptosystem
- Adams, Meijer - 1987
23
McEliece cryptosystem implementation: Theory and Practice
- Biswas, Sendrier - 2008
18
keys for code based cryptography
- Shorter - 2005
17
On the security of the McEliece public-key cryptosystem
- Sendrier - 2002
15
McEliece public key cryptosystems using algebraic-geometric codes
- Janwa, Moreno - 1996
13
Encoding information into constant weight words
- Sendrier - 2005
9
Cryptosystèmes à clé publique basés sur les codes correcteurs d'erreurs. Mémoire d'habilitation à diriger des recherches, Université Paris 6
- Sendrier - 2002
8
Pierre-Louis Cayrel, Philippe Gaborit, and Ayoub Otmani. Reducing key length of the mceliece cryptosystem
- Berger - 2009
8
Knapsack-type crytosystems and algebraic coding theory
- Niederreiter - 1986
8
On the structure of a randomly permuted concatenated code
- Sendrier - 1994
7
Nouvelles constructions utilisant des codes correcteurs d'erreurs en cryptographie à clef publique. Th`ese de doctorat, École Polytechnique
- Finiasz - 2004
6
Factoring polynomials over large nite elds
- Berlekamp - 1971
6
Finding the permutation between equivalent codes: the support splitting algorithm
- Sendrier - 2000
5
Note on decoding binary Goppa codes
- Huber - 2002
4
A new algorithm for nding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
- Canteaut, Chabaud - 1998
3
Optimal asymetric encryption
- Bellare, Rogaway - 1995
3
A method for nding codewords of small weight
- Stern - 1989
3
Further cryptanalysis of the McEliece public-key cryptosystem
- Sun - 2000
2
Computational method and apparatus for nite eld arithmetic
- Omura, James - 1986
1
On the solution of algebraic equations over nite elds. volume 10
- Berlekamp, Rumsey, et al. - 1967
1
Improved identity-based identi cation using correcting codes
- Cayrel, Gaborit, et al.
1
A comparison of vlsi architecture of nite eld multipliers using dual, normal, or standard bases
- Hsu, Truong, et al. - 1988
1
A public-key cryptosystem based on Reed-Muller codes
- Sidel'nikov - 1994
1
On the solution of equations of degree ≤ 10 over nite elds GF(2q
- Zinoviev - 1996
1
Improved identity-based identication using correcting codes
- Cayrel, Gaborit, et al.
1
On the solution of equations of degree 10 over nite elds
- Zinoviev - 1996