Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1108.2462
Cited By
v1
v2
v3
v4 (latest)
Enhanced public key security for the McEliece cryptosystem
11 August 2011
Marco Baldi
Marco Bianchi
F. Chiaraluce
J. Rosenthal
D. Schipani
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Enhanced public key security for the McEliece cryptosystem"
21 / 21 papers shown
Title
Cloud-based Semi-Quantum Money
Yichi Zhang
Siyuan Jin
Yuhan Huang
Bei Zeng
Qiming Shao
30
1
0
16 Jul 2024
Decoding algorithm for HL-codes and performance of the DHH-cryptosystem -- a candidate for post-quantum cryptography
Carolin Hannusch
G. Filippone
34
0
0
17 Mar 2023
Rank-Metric Codes and Their Applications
H. Bartz
Lukas Holzbaur
Hedongliang Liu
Sven Puchinger
Julian Renner
Antonia Wachter-Zeh
61
31
0
23 Mar 2022
On the security of subspace subcodes of Reed-Solomon codes for public key encryption
Alain Couvreur
Matthieu Lequesne
62
11
0
12 Sep 2020
Niederreiter cryptosystems using quasi-cyclic codes that resist quantum Fourier sampling
Upendra S. Kapshikar
A. Mahalanobis
34
0
0
02 Nov 2019
On the security of a Loidreau's rank metric code based encryption scheme
Daniel Coggia
Alain Couvreur
34
16
0
07 Mar 2019
Generalization of the Ball-Collision Algorithm
C. Interlando
Karan Khathuria
Nicole Rohrer
J. Rosenthal
Violetta Weger
28
20
0
28 Dec 2018
Recovering short secret keys of RLCE in polynomial time
Alain Couvreur
Matthieu Lequesne
J. Tillich
34
18
0
29 May 2018
An efficient structural attack on NIST submission DAGS
Élise Barelli
Alain Couvreur
48
18
0
14 May 2018
A Quantum-Secure Niederreiter Cryptosystem using Quasi-Cyclic Codes
Upendra S. Kapshikar
A. Mahalanobis
20
6
0
21 Mar 2018
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes
Marco Baldi
Alessandro Barenghi
F. Chiaraluce
Gerardo Pelosi
Paolo Santini
49
58
0
26 Jan 2018
On Decoding Schemes for the MDPC-McEliece Cryptosystem
H. Bartz
G. Liva
23
19
0
17 Jan 2018
Variations of the McEliece Cryptosystem
Jessalyn Bolkema
H. Gluesing-Luerssen
C. Kelley
Kristin E. Lauter
Beth Malmskog
J. Rosenthal
51
18
0
15 Dec 2016
Using Reed-Solomon codes in the
(
U
∣
U
+
V
)
\left( U\mid U+V\right)
(
U
∣
U
+
V
)
construction and an application to cryptography
Irene Marquez Corbella
J. Tillich
22
0
0
29 Jan 2016
A Polynomial-Time Attack on the BBCRS Scheme
Alain Couvreur
A. Otmani
J. Tillich
Valérie Gauthier
67
36
0
15 Jan 2015
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
Alain Couvreur
A. Otmani
J. Tillich
91
86
0
13 Feb 2014
Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes
Alain Couvreur
Philippe Gaborit
Valérie Gauthier
A. Otmani
J. Tillich
107
119
0
24 Jul 2013
Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures
Marco Baldi
Marco Bianchi
F. Chiaraluce
J. Rosenthal
D. Schipani
88
36
0
23 May 2013
Optimization of the parity-check matrix density in QC-LDPC code-based McEliece cryptosystems
Marco Baldi
Marco Bianchi
F. Chiaraluce
105
30
0
11 Mar 2013
An efficient attack of a McEliece cryptosystem variant based on convolutional codes
Grégory Landais
J. Tillich
AAML
85
56
0
20 Feb 2013
A Distinguisher-Based Attack on a Variant of McEliece's Cryptosystem Based on Reed-Solomon Codes
Valérie Gauthier
A. Otmani
J. Tillich
96
20
0
29 Apr 2012
1