×

Found 94 Documents (Results 1–94)

Differential power analysis of a McEliece cryptosystem. (English) Zbl 1423.94061

Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 538-556 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Zero-knowledge interactive proof systems for new lattice problems. (English) Zbl 1376.94030

Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15–17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 152-169 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New variant of the McEliece cryptosystem. (English) Zbl 1398.94143

Pinto, Raquel (ed.) et al., Coding theory and applications. 4th international castle meeting, ICMCTA, Palmela Castle, Portugal, September 15–18, 2014. Cham: Springer (ISBN 978-3-319-17295-8/hbk; 978-3-319-17296-5/ebook). CIM Series in Mathematical Sciences 3, 291-296 (2015).
MSC:  94A60 94B10
PDFBibTeX XMLCite
Full Text: DOI

Basics of secrecy coding. (English) Zbl 1342.47089

Alpay, Daniel (ed.), Operator theory. With 51 figures and 2 tables. In 2 volumes. Basel: Springer (ISBN 978-3-0348-0666-4/print; 978-3-0348-0667-1/ebook; 978-3-0348-0668-8/print+ebook; 978-3-0348-0692-3/online (updated continuously)). Springer Reference, 931-966 (2015).
MSC:  47N70 94A60 47-01
PDFBibTeX XMLCite
Full Text: DOI

A provably secure signature and signcryption scheme using the hardness assumptions in coding theory. (English) Zbl 1352.94053

Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 342-362 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Polynomial time attack on wild McEliece over quadratic extensions. (English) Zbl 1326.94134

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 17-39 (2014).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices. (English) Zbl 1353.94052

Bertoni, Guido (ed.) et al., Cryptographic hardware and embedded systems – CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40348-4/pbk). Lecture Notes in Computer Science 8086, 273-292 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An efficient attack of a McEliece cryptosystem variant based on convolutional codes. (English) Zbl 1273.94353

Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 102-117 (2013).
MSC:  94A60 94B10
PDFBibTeX XMLCite
Full Text: DOI arXiv

Cryptography from learning parity with noise. (English) Zbl 1298.94103

Bieliková, Mária (ed.) et al., SOFSEM 2012: Theory and practice of computer science. 38th conference on current trends in theory and practice of computer science, Špindlerův Mlýn, Czech Republic, January 21–27, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27659-0/pbk). Lecture Notes in Computer Science 7147, 99-114 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Reducing the key size of rainbow using non-commutative rings. (English) Zbl 1292.94157

Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 68-83 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Wild McEliece incognito. (English) Zbl 1290.94042

Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 244-254 (2011).
MSC:  94A60 94B35 11T71
PDFBibTeX XMLCite
Full Text: DOI Link

Monoidic codes in cryptography. (English) Zbl 1298.94078

Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 179-199 (2011).
PDFBibTeX XMLCite
Full Text: DOI HAL

Implementation of McEliece based on quasi-dyadic Goppa codes for embedded devices. (English) Zbl 1298.94092

Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 143-162 (2011).
MSC:  94A60 94B05 68Q12
PDFBibTeX XMLCite
Full Text: DOI

An efficient attack on all concrete KKS proposals. (English) Zbl 1298.94100

Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 98-116 (2011).
MSC:  94A60 81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI HAL

General fault attacks on multivariate public key cryptosystems. (English) Zbl 1290.94084

Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 1-18 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

McEliece and Niederreiter cryptosystems that resist quantum Fourier sampling attacks. (English) Zbl 1287.94065

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 761-779 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Really fast syndrome-based hashing. (English) Zbl 1280.94039

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 134-152 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

A zero-knowledge identification scheme based on the \(q\)-ary syndrome decoding problem. (English) Zbl 1292.94045

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 171-186 (2011).
MSC:  94A60 94A62 94B35
PDFBibTeX XMLCite
Full Text: DOI

Parallel-CFS: strengthening the CFS McEliece-based signature scheme. (English) Zbl 1292.94062

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 159-170 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Wild McEliece. (English) Zbl 1290.94041

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 143-158 (2011).
MSC:  94A60 11T71 94B35
PDFBibTeX XMLCite
Full Text: DOI

Improvement of lattice-based cryptography using CRT. (English) Zbl 1205.81073

Sergienko, Alexander (ed.) et al., Quantum communication and quantum networking. First international conference, QuantumComm 2009, Naples, Italy, October 26–30, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-11730-5/pbk; 978-3-642-11731-2/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 36, 275-282 (2010).
MSC:  81P94 94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical power analysis attacks on software implementations of McEliece. (English) Zbl 1284.94077

Sendrier, Nicolas (ed.), Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12928-5/pbk). Lecture Notes in Computer Science 6061, 108-125 (2010).
MSC:  94A60 81P94 68P25
PDFBibTeX XMLCite
Full Text: DOI

Reducing key length of the McEliece cryptosystem. (English) Zbl 1246.94022

Preneel, Bart (ed.), Progress in cryptology – AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21–25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 77-97 (2009).
MSC:  94A60 94B15
PDFBibTeX XMLCite
Full Text: DOI HAL

A CCA2 secure public key encryption scheme based on the mceliece assumptions in the standard model. (English) Zbl 1237.94060

Fischlin, Marc (ed.), Topics in cryptology – CT-RSA 2009. The cryptographers’ track at the RSA conference 2009, San Francisco, CA, USA, April 20–24, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00861-0/pbk). Lecture Notes in Computer Science 5473, 240-251 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A new analysis of the McEliece cryptosystem based on QC-LDPC codes. (English) Zbl 1180.94046

Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 246-262 (2008).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI arXiv

Side channels in the McEliece PKC. (English) Zbl 1177.94175

Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 216-229 (2008).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI Link

McEliece cryptosystem implementation: Theory and practice. (English) Zbl 1177.94131

Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 47-62 (2008).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Attacking and defending the McEliece cryptosystem. (English) Zbl 1177.94128

Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 31-46 (2008).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI Link

Separating models of learning with faulty teachers. (English) Zbl 1142.68390

Hutter, Marcus (ed.) et al., Algorithmic learning theory. 18th international conference, ALT 2007, Sendai, Japan, October 1–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75224-0/pbk). Lecture Notes in Computer Science 4754. Lecture Notes in Artificial Intelligence, 94-106 (2007).
MSC:  68Q32 68T05 94A60
PDFBibTeX XMLCite
Full Text: DOI

Learning a parallelepiped: cryptanalysis of GGH and NTRU signatures. (English) Zbl 1140.94365

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 271-288 (2006).
MSC:  94A60 94A62 11T71
PDFBibTeX XMLCite
Full Text: DOI

On the security of the McEliece public-key cryptosystem. (English) Zbl 1072.94007

Blaum, Mario (ed.) et al., Information, coding and mathematics. Proceedings of workshop honoring Professor Bob McEliece on his 60th birthday, Pasadena, CA, USA, May 24–25, 2002. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-7079-9/hbk). The Kluwer International Series in Engineering and Computer Science 687, 141-163 (2002).
PDFBibTeX XMLCite

Sloppy Alice attacks! Adaptive chosen ciphertext attacks on the McEliece public-key cryptosystem. (English) Zbl 1071.94017

Blaum, Mario (ed.) et al., Information, coding and mathematics. Proceedings of workshop honoring Professor Bob McEliece on his 60th birthday, Pasadena, CA, USA, May 24–25, 2002. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-7079-9/hbk). The Kluwer International Series in Engineering and Computer Science 687, 99-119 (2002).
MSC:  94A60 94B27 94B35
PDFBibTeX XMLCite

Semantically secure McEliece public-key cryptosystems – conversions for McEliece PKC –. (English) Zbl 0988.94021

Kim, Kwangjo (ed.), Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13-15, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1992, 19-35 (2001).
MSC:  94A60
PDFBibTeX XMLCite

Strengthening McEliece cryptosystem. (English) Zbl 0974.94017

Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 585-598 (2000).
MSC:  94A60 94B27 20B25
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software