De Feo, Luca; Petit, Christophe; Quisquater, Michaël Deterministic root finding in finite fields. (English) Zbl 1365.68486 ACM Commun. Comput. Algebra 49, No. 3, 87-89 (2015). MSC: 68W30 11T06 11Y05 11Y16 PDFBibTeX XMLCite \textit{L. De Feo} et al., ACM Commun. Comput. Algebra 49, No. 3, 87--89 (2015; Zbl 1365.68486) Full Text: DOI
Chen, Cong; Eisenbarth, Thomas; von Maurich, Ingo; Steinwandt, Rainer Differential power analysis of a McEliece cryptosystem. (English) Zbl 1423.94061 Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 538-556 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Chen} et al., Lect. Notes Comput. Sci. 9092, 538--556 (2015; Zbl 1423.94061) Full Text: DOI
Crépeau, Claude; Kazmi, Raza Ali Zero-knowledge interactive proof systems for new lattice problems. (English) Zbl 1376.94030 Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15–17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 152-169 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Crépeau} and \textit{R. A. Kazmi}, Lect. Notes Comput. Sci. 9496, 152--169 (2015; Zbl 1376.94030) Full Text: DOI
Moufek, Hamza; Guenda, Kenza New variant of the McEliece cryptosystem. (English) Zbl 1398.94143 Pinto, Raquel (ed.) et al., Coding theory and applications. 4th international castle meeting, ICMCTA, Palmela Castle, Portugal, September 15–18, 2014. Cham: Springer (ISBN 978-3-319-17295-8/hbk; 978-3-319-17296-5/ebook). CIM Series in Mathematical Sciences 3, 291-296 (2015). MSC: 94A60 94B10 PDFBibTeX XMLCite \textit{H. Moufek} and \textit{K. Guenda}, CIM Ser. Math. Sci 3, 291--296 (2015; Zbl 1398.94143) Full Text: DOI
Regalia, Phillip A. Basics of secrecy coding. (English) Zbl 1342.47089 Alpay, Daniel (ed.), Operator theory. With 51 figures and 2 tables. In 2 volumes. Basel: Springer (ISBN 978-3-0348-0666-4/print; 978-3-0348-0667-1/ebook; 978-3-0348-0668-8/print+ebook; 978-3-0348-0692-3/online (updated continuously)). Springer Reference, 931-966 (2015). Reviewer: Wilfried Meidl (Linz) MSC: 47N70 94A60 47-01 PDFBibTeX XMLCite \textit{P. A. Regalia}, in: Operator theory. With 51 figures and 2 tables. In 2 volumes. Basel: Springer. 931--966 (2015; Zbl 1342.47089) Full Text: DOI
Wang, Maoning; Liu, Mingjie Improved information set decoding for code-based cryptosystems with constrained memory. (English) Zbl 1408.94994 Wang, Jianxin (ed.) et al., Frontiers in algorithmics. 9th international workshop, FAW 2015, Guilin, China, July 3–5, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9130, 241-258 (2015). MSC: 94B35 94A15 PDFBibTeX XMLCite \textit{M. Wang} and \textit{M. Liu}, Lect. Notes Comput. Sci. 9130, 241--258 (2015; Zbl 1408.94994) Full Text: DOI
Anzis, Benjamin; Tohǎneanu, Ştefan O. Error-correction of linear codes via colon ideals. (English) Zbl 1359.14024 J. Algebra 443, 479-493 (2015). Reviewer: Abdulla Eid (Bahrain) MSC: 14G50 13D02 94B35 11T71 PDFBibTeX XMLCite \textit{B. Anzis} and \textit{Ş. O. Tohǎneanu}, J. Algebra 443, 479--493 (2015; Zbl 1359.14024) Full Text: DOI arXiv
Fujioka, Atsushi; Suzuki, Koutarou; Xagawa, Keita; Yoneyama, Kazuki Strongly secure authenticated key exchange from factoring, codes, and lattices. (English) Zbl 1344.94083 Des. Codes Cryptography 76, No. 3, 469-504 (2015). MSC: 94A62 PDFBibTeX XMLCite \textit{A. Fujioka} et al., Des. Codes Cryptography 76, No. 3, 469--504 (2015; Zbl 1344.94083) Full Text: DOI
Borodin, Mikhail A.; Chizhov, Ivan V. Effective attack on the McEliece cryptosystem based on Reed-Muller codes. (English. Russian original) Zbl 1403.94045 Discrete Math. Appl. 24, No. 5, 273-280 (2014); translation from Diskretn. Mat. 26, No. 1, 10-20 (2014). MSC: 94A60 94B05 PDFBibTeX XMLCite \textit{M. A. Borodin} and \textit{I. V. Chizhov}, Discrete Math. Appl. 24, No. 5, 273--280 (2014; Zbl 1403.94045); translation from Diskretn. Mat. 26, No. 1, 10--20 (2014) Full Text: DOI
Mathew, K. Preetha; Vasant, Sachin; Rangan, C. Pandu A provably secure signature and signcryption scheme using the hardness assumptions in coding theory. (English) Zbl 1352.94053 Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 342-362 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K. P. Mathew} et al., Lect. Notes Comput. Sci. 8565, 342--362 (2014; Zbl 1352.94053) Full Text: DOI
Lim, Seongan; Lee, Hyang-Sook; Choi, Mijin An efficient decoding of Goppa codes for the McEliece cryptosystem. (English) Zbl 1342.94128 Fundam. Inform. 133, No. 4, 387-397 (2014). MSC: 94B35 94B60 94A60 PDFBibTeX XMLCite \textit{S. Lim} et al., Fundam. Inform. 133, No. 4, 387--397 (2014; Zbl 1342.94128) Full Text: DOI
Repka, Marek; Zajac, Pavol Overview of the McEliece cryptosystem and its security. (English) Zbl 1395.94309 Tatra Mt. Math. Publ. 60, 57-83 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Repka} and \textit{P. Zajac}, Tatra Mt. Math. Publ. 60, 57--83 (2014; Zbl 1395.94309) Full Text: DOI OA License
Alléaume, R.; Branciard, C.; Bouda, J.; Debuisschert, T.; Dianati, M.; Gisin, N.; Godfrey, M.; Grangier, P.; Länger, T.; Lütkenhaus, N.; Monyk, C.; Painchault, P.; Peev, M.; Poppe, A.; Pornin, T.; Rarity, J.; Renner, R.; Ribordy, G.; Riguidel, M.; Salvail, L.; Shields, A.; Weinfurter, H.; Zeilinger, A. Using quantum key distribution for cryptographic purposes: a survey. (English) Zbl 1306.81029 Theor. Comput. Sci. 560, Part 1, 62-81 (2014). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{R. Alléaume} et al., Theor. Comput. Sci. 560, Part 1, 62--81 (2014; Zbl 1306.81029) Full Text: DOI arXiv
Micheli, Giacomo; Schiavina, Michele A general construction for monoid-based knapsack protocols. (English) Zbl 1300.94085 Adv. Math. Commun. 8, No. 3, 343-358 (2014). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{G. Micheli} and \textit{M. Schiavina}, Adv. Math. Commun. 8, No. 3, 343--358 (2014; Zbl 1300.94085) Full Text: DOI arXiv
Couvreur, Alain; Gaborit, Philippe; Gauthier-Umaña, Valérie; Otmani, Ayoub; Tillich, Jean-Pierre Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes. (English) Zbl 1310.94138 Des. Codes Cryptography 73, No. 2, 641-666 (2014). MSC: 94A60 94B27 PDFBibTeX XMLCite \textit{A. Couvreur} et al., Des. Codes Cryptography 73, No. 2, 641--666 (2014; Zbl 1310.94138) Full Text: DOI arXiv
Löndahl, Carl; Johansson, Thomas Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x]\) and some cryptographic applications. (English) Zbl 1335.11098 Des. Codes Cryptography 73, No. 2, 625-640 (2014). MSC: 11T06 11T71 94A60 68W20 PDFBibTeX XMLCite \textit{C. Löndahl} and \textit{T. Johansson}, Des. Codes Cryptography 73, No. 2, 625--640 (2014; Zbl 1335.11098) Full Text: DOI
Couvreur, Alain; Otmani, Ayoub; Tillich, Jean-Pierre Polynomial time attack on wild McEliece over quadratic extensions. (English) Zbl 1326.94134 Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 17-39 (2014). MSC: 94B05 94A60 94B25 12F05 68Q25 PDFBibTeX XMLCite \textit{A. Couvreur} et al., Lect. Notes Comput. Sci. 8441, 17--39 (2014; Zbl 1326.94134) Full Text: DOI arXiv
Petit, Christophe Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\). (English) Zbl 1290.94118 Des. Codes Cryptography 71, No. 3, 409-431 (2014). MSC: 94A60 11T71 20-04 11Y05 PDFBibTeX XMLCite \textit{C. Petit}, Des. Codes Cryptography 71, No. 3, 409--431 (2014; Zbl 1290.94118) Full Text: DOI
Piñero, Fernando; Janwa, Heeralal On the subfield subcodes of Hermitian codes. (English) Zbl 1331.94084 Des. Codes Cryptography 70, No. 1-2, 157-173 (2014). MSC: 94B60 05E40 11T71 12Y05 13P10 14G50 14H05 PDFBibTeX XMLCite \textit{F. Piñero} and \textit{H. Janwa}, Des. Codes Cryptography 70, No. 1--2, 157--173 (2014; Zbl 1331.94084) Full Text: DOI
Márquez-Corbella, Irene; Martínez-Moro, Edgar; Pellikaan, Ruud On the unique representation of very strong algebraic geometry codes. (English) Zbl 1312.14075 Des. Codes Cryptography 70, No. 1-2, 215-230 (2014). Reviewer: Abdulla Eid (Bahrain) MSC: 14G50 94A60 94B27 94B35 PDFBibTeX XMLCite \textit{I. Márquez-Corbella} et al., Des. Codes Cryptography 70, No. 1--2, 215--230 (2014; Zbl 1312.14075) Full Text: DOI
Khan, Eraj; Gabidulin, Ernst; Honary, Bahram; Ahmed, Hassan Modified Niederreiter type of GPT cryptosystem based on reducible rank codes. (English) Zbl 1315.94082 Des. Codes Cryptography 70, No. 1-2, 231-239 (2014). MSC: 94A60 94B05 PDFBibTeX XMLCite \textit{E. Khan} et al., Des. Codes Cryptography 70, No. 1--2, 231--239 (2014; Zbl 1315.94082) Full Text: DOI
Yang, Guomin; Tan, Chik How; Mu, Yi; Susilo, Willy; Wong, Duncan S. Identity based identification from algebraic coding theory. (English) Zbl 1352.94073 Theor. Comput. Sci. 520, 51-61 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Yang} et al., Theor. Comput. Sci. 520, 51--61 (2014; Zbl 1352.94073) Full Text: DOI
Faugère, Jean-Charles; Gauthier-Umaña, Valérie; Otmani, Ayoub; Perret, Ludovic; Tillich, Jean-Pierre A distinguisher for high-rate McEliece cryptosystems. (English) Zbl 1364.94536 IEEE Trans. Inf. Theory 59, No. 10, 6830-6844 (2013). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J.-C. Faugère} et al., IEEE Trans. Inf. Theory 59, No. 10, 6830--6844 (2013; Zbl 1364.94536) Full Text: DOI
Heyse, Stefan; von Maurich, Ingo; Güneysu, Tim Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices. (English) Zbl 1353.94052 Bertoni, Guido (ed.) et al., Cryptographic hardware and embedded systems – CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40348-4/pbk). Lecture Notes in Computer Science 8086, 273-292 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Heyse} et al., Lect. Notes Comput. Sci. 8086, 273--292 (2013; Zbl 1353.94052) Full Text: DOI
Landais, Grégory; Tillich, Jean-Pierre An efficient attack of a McEliece cryptosystem variant based on convolutional codes. (English) Zbl 1273.94353 Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 102-117 (2013). MSC: 94A60 94B10 PDFBibTeX XMLCite \textit{G. Landais} and \textit{J.-P. Tillich}, Lect. Notes Comput. Sci. 7932, 102--117 (2013; Zbl 1273.94353) Full Text: DOI arXiv
Freeman, David Mandell; Goldreich, Oded; Kiltz, Eike; Rosen, Alon; Segev, Gil More constructions of lossy and correlation-secure trapdoor functions. (English) Zbl 1291.94083 J. Cryptology 26, No. 1, 39-74 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{D. M. Freeman} et al., J. Cryptology 26, No. 1, 39--74 (2013; Zbl 1291.94083) Full Text: DOI
Márquez-Corbella, Irene; Martínez-Moro, Edgar; Pellikaan, Ruud The non-gap sequence of a subcode of a generalized Reed-Solomon code. (English) Zbl 1263.94039 Des. Codes Cryptography 66, No. 1-3, 317-333 (2013). Reviewer: Adrian Atanasiu (Bucharest) MSC: 94B27 14G50 94A60 PDFBibTeX XMLCite \textit{I. Márquez-Corbella} et al., Des. Codes Cryptography 66, No. 1--3, 317--333 (2013; Zbl 1263.94039) Full Text: DOI
Döttling, Nico; Dowsley, Rafael; Müller-Quade, Jörn; Nascimento, Anderson C. A. A CCA2 secure variant of the McEliece cryptosystem. (English) Zbl 1364.94534 IEEE Trans. Inf. Theory 58, No. 10, 6672-6680 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Döttling} et al., IEEE Trans. Inf. Theory 58, No. 10, 6672--6680 (2012; Zbl 1364.94534) Full Text: DOI arXiv
Fujita, Hachiro Quantum McEliece public-key cryptosystem. (English) Zbl 1256.81031 Quantum Inf. Comput. 12, No. 3-4, 181-202 (2012). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{H. Fujita}, Quantum Inf. Comput. 12, No. 3--4, 181--202 (2012; Zbl 1256.81031)
Pietrzak, Krzysztof Cryptography from learning parity with noise. (English) Zbl 1298.94103 Bieliková, Mária (ed.) et al., SOFSEM 2012: Theory and practice of computer science. 38th conference on current trends in theory and practice of computer science, Špindlerův Mlýn, Czech Republic, January 21–27, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27659-0/pbk). Lecture Notes in Computer Science 7147, 99-114 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 7147, 99--114 (2012; Zbl 1298.94103) Full Text: DOI
Yasuda, Takanori; Sakurai, Kouichi; Takagi, Tsuyoshi Reducing the key size of rainbow using non-commutative rings. (English) Zbl 1292.94157 Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 68-83 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Yasuda} et al., Lect. Notes Comput. Sci. 7178, 68--83 (2012; Zbl 1292.94157) Full Text: DOI
Alekhnovich, Michael More on average case vs approximation complexity. (English) Zbl 1242.68109 Comput. Complexity 20, No. 4, 755-786 (2011). MSC: 68Q17 68Q30 68W25 03F20 68Q10 94A60 PDFBibTeX XMLCite \textit{M. Alekhnovich}, Comput. Complexity 20, No. 4, 755--786 (2011; Zbl 1242.68109) Full Text: DOI
Wang, Houzhen; Zhang, Huanguo; Wang, Zhangyi; Tang, Ming Extended multivariate public key cryptosystems with secure encryption function. (English) Zbl 1237.94116 Sci. China, Inf. Sci. 54, No. 6, 1161-1171 (2011). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{H. Wang} et al., Sci. China, Inf. Sci. 54, No. 6, 1161--1171 (2011; Zbl 1237.94116) Full Text: DOI Link
Bernstein, Daniel J.; Lange, Tanja; Peters, Christiane Wild McEliece incognito. (English) Zbl 1290.94042 Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 244-254 (2011). MSC: 94A60 94B35 11T71 PDFBibTeX XMLCite \textit{D. J. Bernstein} et al., Lect. Notes Comput. Sci. 7071, 244--254 (2011; Zbl 1290.94042) Full Text: DOI Link
Niebuhr, Robert Statistical decoding of codes over \(\mathbb{F}_q\). (English) Zbl 1298.94143 Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 217-227 (2011). MSC: 94B35 11T71 94A60 PDFBibTeX XMLCite \textit{R. Niebuhr}, Lect. Notes Comput. Sci. 7071, 217--227 (2011; Zbl 1298.94143) Full Text: DOI
Barreto, Paulo S. L. M.; Lindner, Richard; Misoczki, Rafael Monoidic codes in cryptography. (English) Zbl 1298.94078 Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 179-199 (2011). MSC: 94A60 94B27 11T71 81P94 94B35 PDFBibTeX XMLCite \textit{P. S. L. M. Barreto} et al., Lect. Notes Comput. Sci. 7071, 179--199 (2011; Zbl 1298.94078) Full Text: DOI HAL
Heyse, Stefan Implementation of McEliece based on quasi-dyadic Goppa codes for embedded devices. (English) Zbl 1298.94092 Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 143-162 (2011). MSC: 94A60 94B05 68Q12 PDFBibTeX XMLCite \textit{S. Heyse}, Lect. Notes Comput. Sci. 7071, 143--162 (2011; Zbl 1298.94092) Full Text: DOI
Otmani, Ayoub; Tillich, Jean-Pierre An efficient attack on all concrete KKS proposals. (English) Zbl 1298.94100 Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 98-116 (2011). MSC: 94A60 81P94 94A62 PDFBibTeX XMLCite \textit{A. Otmani} and \textit{J.-P. Tillich}, Lect. Notes Comput. Sci. 7071, 98--116 (2011; Zbl 1298.94100) Full Text: DOI HAL
Hashimoto, Yasufumi; Takagi, Tsuyoshi; Sakurai, Kouichi General fault attacks on multivariate public key cryptosystems. (English) Zbl 1290.94084 Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 1-18 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Hashimoto} et al., Lect. Notes Comput. Sci. 7071, 1--18 (2011; Zbl 1290.94084) Full Text: DOI
Dinh, Hang; Moore, Cristopher; Russell, Alexander McEliece and Niederreiter cryptosystems that resist quantum Fourier sampling attacks. (English) Zbl 1287.94065 Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 761-779 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Dinh} et al., Lect. Notes Comput. Sci. 6841, 761--779 (2011; Zbl 1287.94065) Full Text: DOI arXiv
Bernstein, Daniel J.; Lange, Tanja; Peters, Christiane; Schwabe, Peter Really fast syndrome-based hashing. (English) Zbl 1280.94039 Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 134-152 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{D. J. Bernstein} et al., Lect. Notes Comput. Sci. 6737, 134--152 (2011; Zbl 1280.94039) Full Text: DOI Link
Indesteege, Sebastiaan; Preneel, Bart Practical collisions for EnRUPT. (English) Zbl 1209.68221 J. Cryptology 24, No. 1, 1-23 (2011). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{S. Indesteege} and \textit{B. Preneel}, J. Cryptology 24, No. 1, 1--23 (2011; Zbl 1209.68221) Full Text: DOI Link
Caboara, Massimo; Caruso, Fabrizio; Traverso, Carlo Lattice polly cracker cryptosystems. (English) Zbl 1213.94088 J. Symb. Comput. 46, No. 5, 534-549 (2011). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 94A60 13P10 11H06 PDFBibTeX XMLCite \textit{M. Caboara} et al., J. Symb. Comput. 46, No. 5, 534--549 (2011; Zbl 1213.94088) Full Text: DOI
Cayrel, Pierre-Louis; Véron, Pascal; Alaoui, Sidi Mohamed El Yousfi A zero-knowledge identification scheme based on the \(q\)-ary syndrome decoding problem. (English) Zbl 1292.94045 Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 171-186 (2011). MSC: 94A60 94A62 94B35 PDFBibTeX XMLCite \textit{P.-L. Cayrel} et al., Lect. Notes Comput. Sci. 6544, 171--186 (2011; Zbl 1292.94045) Full Text: DOI
Finiasz, Matthieu Parallel-CFS: strengthening the CFS McEliece-based signature scheme. (English) Zbl 1292.94062 Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 159-170 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Finiasz}, Lect. Notes Comput. Sci. 6544, 159--170 (2011; Zbl 1292.94062) Full Text: DOI
Bernstein, Daniel J.; Lange, Tanja; Peters, Christiane Wild McEliece. (English) Zbl 1290.94041 Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 143-158 (2011). MSC: 94A60 11T71 94B35 PDFBibTeX XMLCite \textit{D. J. Bernstein} et al., Lect. Notes Comput. Sci. 6544, 143--158 (2011; Zbl 1290.94041) Full Text: DOI
Chizhov, I. V. The relationship between structure of the key space and hardness of the McEliece-Sidelnikov public key cryptosystem. (Russian. English summary) Zbl 1517.94081 Prikl. Diskretn. Mat. 2009, Suppl. 3, 34-35 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{I. V. Chizhov}, Prikl. Diskretn. Mat. 2009, 34--35 (2010; Zbl 1517.94081) Full Text: MNR
Shoufan, Abdulhadi; Wink, Thorsten; Molter, H. Gregor; Huss, Sorin A.; Kohnert, Eike A novel cryptoprocessor architecture for the McEliece public-key cryptosystem. (English) Zbl 1366.94534 IEEE Trans. Comput. 59, No. 11, 1533-1546 (2010). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Shoufan} et al., IEEE Trans. Comput. 59, No. 11, 1533--1546 (2010; Zbl 1366.94534) Full Text: DOI
Otmani, Ayoub; Tillich, Jean-Pierre; Dallot, Léonard Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes. (English) Zbl 1205.94095 Math. Comput. Sci. 3, No. 2, 129-140 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Otmani} et al., Math. Comput. Sci. 3, No. 2, 129--140 (2010; Zbl 1205.94095) Full Text: DOI arXiv
Plantard, Thomas; Rose, Mike; Susilo, Willy Improvement of lattice-based cryptography using CRT. (English) Zbl 1205.81073 Sergienko, Alexander (ed.) et al., Quantum communication and quantum networking. First international conference, QuantumComm 2009, Naples, Italy, October 26–30, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-11730-5/pbk; 978-3-642-11731-2/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 36, 275-282 (2010). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{T. Plantard} et al., in: Quantum communication and quantum networking. First international conference, QuantumComm 2009, Naples, Italy, October 26--30, 2009. Revised selected papers. Berlin: Springer. 275--282 (2010; Zbl 1205.81073) Full Text: DOI
Loidreau, Pierre Designing a rank metric based McEliece cryptosystem. (English) Zbl 1284.94089 Sendrier, Nicolas (ed.), Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12928-5/pbk). Lecture Notes in Computer Science 6061, 142-152 (2010). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{P. Loidreau}, Lect. Notes Comput. Sci. 6061, 142--152 (2010; Zbl 1284.94089) Full Text: DOI
Heyse, Stefan; Moradi, Amir; Paar, Christof Practical power analysis attacks on software implementations of McEliece. (English) Zbl 1284.94077 Sendrier, Nicolas (ed.), Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12928-5/pbk). Lecture Notes in Computer Science 6061, 108-125 (2010). MSC: 94A60 81P94 68P25 PDFBibTeX XMLCite \textit{S. Heyse} et al., Lect. Notes Comput. Sci. 6061, 108--125 (2010; Zbl 1284.94077) Full Text: DOI
Chizhov, I. V. The key space of the McEliece-Sidelnikov cryptosystem. (English. Russian original) Zbl 1243.94025 Discrete Math. Appl. 19, No. 5, 445-474 (2009); translation from Diskretn. Mat. 21, No. 3, 132-159 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{I. V. Chizhov}, Discrete Math. Appl. 19, No. 5, 445--474 (2009; Zbl 1243.94025); translation from Diskretn. Mat. 21, No. 3, 132--159 (2009) Full Text: DOI
Freyre, P.; Díaz, N.; Morgado, E. R. Fast algorithm for the multiplication of a row vector by a randomly selected matrix \(A\). (English) Zbl 1192.65047 J. Discrete Math. Sci. Cryptography 12, No. 5, 533-549 (2009). Reviewer: Rózsa Horvàth-Bokor (Budapest) MSC: 65F30 15B52 65Y20 94A60 15B33 PDFBibTeX XMLCite \textit{P. Freyre} et al., J. Discrete Math. Sci. Cryptography 12, No. 5, 533--549 (2009; Zbl 1192.65047) Full Text: DOI
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal Cryptography with constant input locality. (English) Zbl 1183.94018 J. Cryptology 22, No. 4, 429-469 (2009). Reviewer: Jerzy Żurawiecki (Lublin) MSC: 94A60 94A62 94B05 94B99 PDFBibTeX XMLCite \textit{B. Applebaum} et al., J. Cryptology 22, No. 4, 429--469 (2009; Zbl 1183.94018) Full Text: DOI
Chizhov, I. V. The number of public keys in the McEliece-Sidel’nikov cryptosystem. (English. Russian original) Zbl 1172.94570 Mosc. Univ. Comput. Math. Cybern. 33, No. 3, 151-157 (2009); translation from Vestn. Mosk. Univ., Ser. XV. 2009, No. 3, 40-45 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{I. V. Chizhov}, Mosc. Univ. Comput. Math. Cybern. 33, No. 3, 151--157 (2009; Zbl 1172.94570); translation from Vestn. Mosk. Univ., Ser. XV. 2009, No. 3, 40--45 (2009) Full Text: DOI
Mihaljević, Miodrag J.; Imai, Hideki An approach for stream ciphers design based on joint computing over random and secret data. (English) Zbl 1172.94009 Computing 85, No. 1-2, 153-168 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{M. J. Mihaljević} and \textit{H. Imai}, Computing 85, No. 1--2, 153--168 (2009; Zbl 1172.94009) Full Text: DOI
Berger, Thierry P.; Cayrel, Pierre-Louis; Gaborit, Philippe; Otmani, Ayoub Reducing key length of the McEliece cryptosystem. (English) Zbl 1246.94022 Preneel, Bart (ed.), Progress in cryptology – AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21–25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 77-97 (2009). MSC: 94A60 94B15 PDFBibTeX XMLCite \textit{T. P. Berger} et al., Lect. Notes Comput. Sci. 5580, 77--97 (2009; Zbl 1246.94022) Full Text: DOI HAL
Feldman, Vitaly; Shah, Shrenik Separating models of learning with faulty teachers. (English) Zbl 1167.68025 Theor. Comput. Sci. 410, No. 19, 1903-1912 (2009). MSC: 68Q32 68T05 94A60 PDFBibTeX XMLCite \textit{V. Feldman} and \textit{S. Shah}, Theor. Comput. Sci. 410, No. 19, 1903--1912 (2009; Zbl 1167.68025) Full Text: DOI
Nguyen, Phong Q.; Regev, Oded Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures. (English) Zbl 1159.94369 J. Cryptology 22, No. 2, 139-160 (2009). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{P. Q. Nguyen} and \textit{O. Regev}, J. Cryptology 22, No. 2, 139--160 (2009; Zbl 1159.94369) Full Text: DOI
Dowsley, Rafael; Müller-Quade, Jörn; Nascimento, Anderson C. A. A CCA2 secure public key encryption scheme based on the mceliece assumptions in the standard model. (English) Zbl 1237.94060 Fischlin, Marc (ed.), Topics in cryptology – CT-RSA 2009. The cryptographers’ track at the RSA conference 2009, San Francisco, CA, USA, April 20–24, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00861-0/pbk). Lecture Notes in Computer Science 5473, 240-251 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Dowsley} et al., Lect. Notes Comput. Sci. 5473, 240--251 (2009; Zbl 1237.94060) Full Text: DOI
Sicot, Guillaume; Houcke, Sebastien; Barbier, Johann Blind detection of interleaver parameters. (English) Zbl 1157.94349 Signal Process. 89, No. 4, 450-462 (2009). MSC: 94A13 PDFBibTeX XMLCite \textit{G. Sicot} et al., Signal Process. 89, No. 4, 450--462 (2009; Zbl 1157.94349) Full Text: DOI HAL
Lu, Yi; Vaudenay, Serge Cryptanalysis of an E0-like combiner with memory. (English) Zbl 1161.94416 J. Cryptology 21, No. 3, 430-457 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Lu} and \textit{S. Vaudenay}, J. Cryptology 21, No. 3, 430--457 (2008; Zbl 1161.94416) Full Text: DOI
Nojima, Ryo; Imai, Hideki; Kobara, Kazukuni; Morozov, Kirill Semantic security for the McEliece cryptosystem without random oracles. (English) Zbl 1196.94062 Des. Codes Cryptography 49, No. 1-3, 289-305 (2008). MSC: 94A60 11T71 14G50 PDFBibTeX XMLCite \textit{R. Nojima} et al., Des. Codes Cryptography 49, No. 1--3, 289--305 (2008; Zbl 1196.94062) Full Text: DOI
Gabidulin, Ernst M. Attacks and counter-attacks on the GPT public key cryptosystem. (English) Zbl 1196.94050 Des. Codes Cryptography 48, No. 2, 171-177 (2008). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{E. M. Gabidulin}, Des. Codes Cryptography 48, No. 2, 171--177 (2008; Zbl 1196.94050) Full Text: DOI
Baldi, Marco; Bodrato, Marco; Chiaraluce, Franco A new analysis of the McEliece cryptosystem based on QC-LDPC codes. (English) Zbl 1180.94046 Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 246-262 (2008). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. Baldi} et al., Lect. Notes Comput. Sci. 5229, 246--262 (2008; Zbl 1180.94046) Full Text: DOI arXiv
Strenzke, Falko; Tews, Erik; Molter, H. Gregor; Overbeck, Raphael; Shoufan, Abdulhadi Side channels in the McEliece PKC. (English) Zbl 1177.94175 Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 216-229 (2008). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{F. Strenzke} et al., Lect. Notes Comput. Sci. 5299, 216--229 (2008; Zbl 1177.94175) Full Text: DOI Link
Finiasz, Matthieu Syndrome based collision resistant hashing. (English) Zbl 1177.94144 Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 137-147 (2008). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{M. Finiasz}, Lect. Notes Comput. Sci. 5299, 137--147 (2008; Zbl 1177.94144) Full Text: DOI
Biswas, Bhaskar; Sendrier, Nicolas McEliece cryptosystem implementation: Theory and practice. (English) Zbl 1177.94131 Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 47-62 (2008). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{B. Biswas} and \textit{N. Sendrier}, Lect. Notes Comput. Sci. 5299, 47--62 (2008; Zbl 1177.94131) Full Text: DOI
Bernstein, Daniel J.; Lange, Tanja; Peters, Christiane Attacking and defending the McEliece cryptosystem. (English) Zbl 1177.94128 Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 31-46 (2008). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{D. J. Bernstein} et al., Lect. Notes Comput. Sci. 5299, 31--46 (2008; Zbl 1177.94128) Full Text: DOI Link
Imai, Hideki; Hagiwara, Manabu Error-correcting codes and cryptography. (English) Zbl 1242.94030 Appl. Algebra Eng. Commun. Comput. 19, No. 3, 213-228 (2008). MSC: 94A60 94-02 94Bxx PDFBibTeX XMLCite \textit{H. Imai} and \textit{M. Hagiwara}, Appl. Algebra Eng. Commun. Comput. 19, No. 3, 213--228 (2008; Zbl 1242.94030) Full Text: DOI
Overbeck, R. Structural attacks for public key cryptosystems based on Gabidulin codes. (English) Zbl 1159.94009 J. Cryptology 21, No. 2, 280-301 (2008). Reviewer: Ivan Landjev (Sofia) MSC: 94B05 94A60 PDFBibTeX XMLCite \textit{R. Overbeck}, J. Cryptology 21, No. 2, 280--301 (2008; Zbl 1159.94009) Full Text: DOI
Fossorier, Marc P. C.; Kobara, Kazukuni; Imai, Hideki Modeling bit flipping decoding based on nonorthogonal check sums with application to iterative decoding attack of McEliece cryptosystem. (English) Zbl 1310.94143 IEEE Trans. Inf. Theory 53, No. 1, 402-411 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{M. P. C. Fossorier} et al., IEEE Trans. Inf. Theory 53, No. 1, 402--411 (2007; Zbl 1310.94143) Full Text: DOI
Feldman, Vitaly; Shah, Shrenik; Wadhwa, Neal Separating models of learning with faulty teachers. (English) Zbl 1142.68390 Hutter, Marcus (ed.) et al., Algorithmic learning theory. 18th international conference, ALT 2007, Sendai, Japan, October 1–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75224-0/pbk). Lecture Notes in Computer Science 4754. Lecture Notes in Artificial Intelligence, 94-106 (2007). MSC: 68Q32 68T05 94A60 PDFBibTeX XMLCite \textit{V. Feldman} et al., Lect. Notes Comput. Sci. 4754, 94--106 (2007; Zbl 1142.68390) Full Text: DOI
Shen, Changxiang; Zhang, Huangguo; Feng, Dengguo; Cao, Zhenfu; Huang, Jiwu Survey of information security. (English) Zbl 1142.94013 Sci. China, Ser. F. 50, No. 3, 273-298 (2007). MSC: 94A60 94-02 68P25 68M12 PDFBibTeX XMLCite \textit{C. Shen} et al., Sci. China, Ser. F 50, No. 3, 273--298 (2007; Zbl 1142.94013) Full Text: DOI
Kiayias, Aggelos; Yung, Moti Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice. (English) Zbl 1132.94005 Des. Codes Cryptography 43, No. 2-3, 61-78 (2007). Reviewer: T. G. Berry (Caracas) MSC: 94A60 94B05 68P25 PDFBibTeX XMLCite \textit{A. Kiayias} and \textit{M. Yung}, Des. Codes Cryptography 43, No. 2--3, 61--78 (2007; Zbl 1132.94005) Full Text: DOI
Engelbert, D.; Overbeck, R.; Schmidt, Arthur A summary of McEliece-type cryptosystems and their security. (English) Zbl 1278.94047 J. Math. Cryptol. 1, No. 2, 151-199 (2007). MSC: 94A60 11T71 68P25 94B05 PDFBibTeX XMLCite \textit{D. Engelbert} et al., J. Math. Cryptol. 1, No. 2, 151--199 (2007; Zbl 1278.94047) Full Text: DOI
Nguyen, Phong Q.; Regev, Oded Learning a parallelepiped: cryptanalysis of GGH and NTRU signatures. (English) Zbl 1140.94365 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 271-288 (2006). MSC: 94A60 94A62 11T71 PDFBibTeX XMLCite \textit{P. Q. Nguyen} and \textit{O. Regev}, Lect. Notes Comput. Sci. 4004, 271--288 (2006; Zbl 1140.94365) Full Text: DOI
Izmerly, Oleg; Mor, Tal Chosen ciphertext attacks on lattice-based public key encryption and modern (non-quantum) cryptography in a quantum environment. (English) Zbl 1149.94012 Theor. Comput. Sci. 367, No. 3, 308-323 (2006). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{O. Izmerly} and \textit{T. Mor}, Theor. Comput. Sci. 367, No. 3, 308--323 (2006; Zbl 1149.94012) Full Text: DOI
Juels, Ari; Sudan, Madhu A fuzzy vault scheme. (English) Zbl 1172.94578 Des. Codes Cryptography 38, No. 2, 237-257 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{A. Juels} and \textit{M. Sudan}, Des. Codes Cryptography 38, No. 2, 237--257 (2006; Zbl 1172.94578) Full Text: DOI
Berger, Thierry P.; Loidreau, Pierre How to mask the structure of codes for a cryptographic use. (English) Zbl 1136.11327 Des. Codes Cryptography 35, No. 1, 63-79 (2005). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{T. P. Berger} and \textit{P. Loidreau}, Des. Codes Cryptography 35, No. 1, 63--79 (2005; Zbl 1136.11327) Full Text: DOI
Karpunin, G. A. On the McEliece public-key cryptosystem based on Reed-Muller binary codes. (English. Russian original) Zbl 1121.94019 Discrete Math. Appl. 14, No. 3, 257-262 (2004); translation from Diskretn. Mat. 16, No. 2, 79-84 (2004). MSC: 94A60 PDFBibTeX XMLCite \textit{G. A. Karpunin}, Discrete Math. Appl. 14, No. 3, 79--84 (2004; Zbl 1121.94019); translation from Diskretn. Mat. 16, No. 2, 79--84 (2004) Full Text: DOI
Ourivski, A. V.; Gabidulin, E. M. Column scrambler for the GPT cryptosystem. (English) Zbl 1022.94012 Discrete Appl. Math. 128, No. 1, 207-221 (2003). MSC: 94A60 94B05 PDFBibTeX XMLCite \textit{A. V. Ourivski} and \textit{E. M. Gabidulin}, Discrete Appl. Math. 128, No. 1, 207--221 (2003; Zbl 1022.94012) Full Text: DOI
Zhang, Zhenfeng; Feng, Dengguo; Dai, Zongduo Cryptanalysis of AW digital signature scheme based on error-correcting codes. (English) Zbl 1185.94075 Sci. China, Ser. F 45, No. 5, 397-400 (2002). MSC: 94A60 94B99 PDFBibTeX XMLCite \textit{Z. Zhang} et al., Sci. China, Ser. F 45, No. 5, 397--400 (2002; Zbl 1185.94075) Full Text: DOI
Sendrier, Nicolas On the security of the McEliece public-key cryptosystem. (English) Zbl 1072.94007 Blaum, Mario (ed.) et al., Information, coding and mathematics. Proceedings of workshop honoring Professor Bob McEliece on his 60th birthday, Pasadena, CA, USA, May 24–25, 2002. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-7079-9/hbk). The Kluwer International Series in Engineering and Computer Science 687, 141-163 (2002). Reviewer: Sergey Stepanov (Moskva) MSC: 94A60 94A62 94B05 94B35 94-06 PDFBibTeX XMLCite \textit{N. Sendrier}, Kluwer Int. Ser. Eng. Comput. Sci. 687, 141--163 (2002; Zbl 1072.94007)
Verheul, Eric R.; Doumen, Jeroen M.; van Tilborg, Henk C. A. Sloppy Alice attacks! Adaptive chosen ciphertext attacks on the McEliece public-key cryptosystem. (English) Zbl 1071.94017 Blaum, Mario (ed.) et al., Information, coding and mathematics. Proceedings of workshop honoring Professor Bob McEliece on his 60th birthday, Pasadena, CA, USA, May 24–25, 2002. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-7079-9/hbk). The Kluwer International Series in Engineering and Computer Science 687, 99-119 (2002). MSC: 94A60 94B27 94B35 PDFBibTeX XMLCite \textit{E. R. Verheul} et al., Kluwer Int. Ser. Eng. Comput. Sci. 687, 99--119 (2002; Zbl 1071.94017)
Loidreau, Pierre; Sendrier, Nicolas Weak keys in the McEliece public-key cryptosystem. (English) Zbl 0994.94029 IEEE Trans. Inf. Theory 47, No. 3, 1207-1211 (2001). MSC: 94A62 PDFBibTeX XMLCite \textit{P. Loidreau} and \textit{N. Sendrier}, IEEE Trans. Inf. Theory 47, No. 3, 1207--1211 (2001; Zbl 0994.94029) Full Text: DOI
Solé, Patrick; Charnes, Chris; Martin, Bruno A lattice-based McEliece scheme for encryption and signature. (English) Zbl 0991.94515 Augot, Daniel (ed.) et al., WCC2001 international workshop on coding and cryptography. Paris, France, January 8-12, 2001. Amsterdam: Elsevier, Electron. Notes Discrete Math. 6, no pag., electronic only (2001). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{P. Solé} et al., Electron. Notes Discrete Math. 6, no pag. (2001; Zbl 0991.94515)
Gabidulin, Ernst M.; Ourivski, A. V. Modified GPT PKC with right scrambler. (English) Zbl 0987.94507 Augot, Daniel (ed.) et al., WCC2001 international workshop on coding and cryptography. Paris, France, January 8-12, 2001. Amsterdam: Elsevier, Electron. Notes Discrete Math. 6, no pag., electronic only (2001). MSC: 94A60 PDFBibTeX XMLCite \textit{E. M. Gabidulin} and \textit{A. V. Ourivski}, Electron. Notes Discrete Math. 6, no pag. (2001; Zbl 0987.94507)
Valembois, Antoine Detection and recognition of a binary linear code. (English) Zbl 1025.94020 Discrete Appl. Math. 111, No. 1-2, 199-218 (2001). Reviewer: Demetre Voukalis (Athens) MSC: 94B05 94A55 PDFBibTeX XMLCite \textit{A. Valembois}, Discrete Appl. Math. 111, No. 1--2, 199--218 (2001; Zbl 1025.94020) Full Text: DOI
Kobara, Kazukuni; Imai, Hideki Semantically secure McEliece public-key cryptosystems – conversions for McEliece PKC –. (English) Zbl 0988.94021 Kim, Kwangjo (ed.), Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13-15, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1992, 19-35 (2001). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kobara} and \textit{H. Imai}, Lect. Notes Comput. Sci. 1992, 19--35 (2001; Zbl 0988.94021)
Loidreau, Pierre Strengthening McEliece cryptosystem. (English) Zbl 0974.94017 Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 585-598 (2000). MSC: 94A60 94B27 20B25 PDFBibTeX XMLCite \textit{P. Loidreau}, Lect. Notes Comput. Sci. 1976, 585--598 (2000; Zbl 0974.94017)
Tao, Renji; Chen, Shihua Input-trees of finite automata and application to cryptanalysis. (English) Zbl 0976.94024 J. Comput. Sci. Technol. 15, No. 4, 305-325 (2000). MSC: 94A60 68Q45 68P25 PDFBibTeX XMLCite \textit{R. Tao} and \textit{S. Chen}, J. Comput. Sci. Technol. 15, No. 4, 305--325 (2000; Zbl 0976.94024) Full Text: DOI
Wu, Chuan-Kun; Varadharajan, Vijay Public key cryptosystems based on Boolean permutations and their applications. (English) Zbl 0978.94039 Int. J. Comput. Math. 74, No. 2, 167-184 (2000). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{C.-K. Wu} and \textit{V. Varadharajan}, Int. J. Comput. Math. 74, No. 2, 167--184 (2000; Zbl 0978.94039) Full Text: DOI