ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1307.6458
  4. Cited By
Distinguisher-Based Attacks on Public-Key Cryptosystems Using
  Reed-Solomon Codes
v1v2 (latest)

Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes

24 July 2013
Alain Couvreur
Philippe Gaborit
Valérie Gauthier
A. Otmani
J. Tillich
ArXiv (abs)PDFHTML

Papers citing "Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes"

29 / 29 papers shown
Title
The Tangent Space Attack
The Tangent Space Attack
Axel Lemoine
137
0
0
15 May 2025
MinRank Gabidulin encryption scheme on matrix codes
MinRank Gabidulin encryption scheme on matrix codes
Nicolas Aragon
Alain Couvreur
Victor Dyseryn
Philippe Gaborit
Adrien Vinçotte
43
1
0
26 May 2024
On the matrix code of quadratic relationships for a Goppa code
On the matrix code of quadratic relationships for a Goppa code
Rocco Mora
90
0
0
31 Oct 2023
Injective Rank Metric Trapdoor Functions with Homogeneous Errors
Injective Rank Metric Trapdoor Functions with Homogeneous Errors
Étienne Burle
Philippe Gaborit
Younes Hatri
A. Otmani
50
1
0
13 Oct 2023
A new approach based on quadratic forms to attack the McEliece
  cryptosystem
A new approach based on quadratic forms to attack the McEliece cryptosystem
Alain Couvreur
Rocco Mora
J. Tillich
98
12
0
17 Jun 2023
Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding
Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding
Maxime Bombar
Geoffroy Couteau
Alain Couvreur
Clément Ducros
72
13
0
06 Jun 2023
Polynomial time key-recovery attack on high rate random alternant codes
Polynomial time key-recovery attack on high rate random alternant codes
M. Bardet
Rocco Mora
J. Tillich
130
12
0
28 Apr 2023
Revisiting Algebraic Attacks on MinRank and on the Rank Decoding Problem
Revisiting Algebraic Attacks on MinRank and on the Rank Decoding Problem
M. Bardet
P. Briaud
Maxime Bros
Philippe Gaborit
J. Tillich
AAML
49
24
0
10 Aug 2022
On the dimension and structure of the square of the dual of a Goppa code
On the dimension and structure of the square of the dual of a Goppa code
Rocco Mora
J. Tillich
30
17
0
25 Nov 2021
On the security of subspace subcodes of Reed-Solomon codes for public
  key encryption
On the security of subspace subcodes of Reed-Solomon codes for public key encryption
Alain Couvreur
Matthieu Lequesne
69
11
0
12 Sep 2020
Algebraic geometry codes and some applications
Algebraic geometry codes and some applications
Alain Couvreur
H. Randriambololona
55
11
0
02 Sep 2020
Encryption Scheme Based on Expanded Reed-Solomon Codes
Encryption Scheme Based on Expanded Reed-Solomon Codes
Karan Khathuria
J. Rosenthal
Violetta Weger
87
23
0
03 Jun 2019
Practical Algebraic Attack on DAGS
Practical Algebraic Attack on DAGS
M. Bardet
Manon Bertin
Alain Couvreur
A. Otmani
43
4
0
09 May 2019
Cryptanalysis of a System Based on Twisted Reed-Solomon Codes
Cryptanalysis of a System Based on Twisted Reed-Solomon Codes
Julien Lavauzelle
Julian Renner
120
32
0
26 Apr 2019
On the security of a Loidreau's rank metric code based encryption scheme
On the security of a Loidreau's rank metric code based encryption scheme
Daniel Coggia
Alain Couvreur
41
16
0
07 Mar 2019
Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions
  Based on Codes
Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes
Thomas Debris-Alazard
N. Sendrier
J. Tillich
52
15
0
16 Oct 2018
Recovering short secret keys of RLCE in polynomial time
Recovering short secret keys of RLCE in polynomial time
Alain Couvreur
Matthieu Lequesne
J. Tillich
39
18
0
29 May 2018
An efficient structural attack on NIST submission DAGS
An efficient structural attack on NIST submission DAGS
Élise Barelli
Alain Couvreur
55
18
0
14 May 2018
Structural Properties of Twisted Reed-Solomon Codes with Applications to
  Cryptography
Structural Properties of Twisted Reed-Solomon Codes with Applications to Cryptography
Peter Beelen
M. Bossert
Sven Puchinger
J. Rosenkilde
57
29
0
22 Jan 2018
PKC-PC: A Variant of the McEliece Public Key Cryptosystem based on Polar
  Codes
PKC-PC: A Variant of the McEliece Public Key Cryptosystem based on Polar Codes
Reza Hooshmand
Masoumeh Koochak Shooshtari
M. R. Aref
38
19
0
20 Dec 2017
Cryptanalysis of a public key encryption scheme based on QC-LDPC and
  QC-MDPC codes
Cryptanalysis of a public key encryption scheme based on QC-LDPC and QC-MDPC codes
V. Dragoi
Hervé Talé Kalachi
53
8
0
06 Dec 2017
Variations of the McEliece Cryptosystem
Variations of the McEliece Cryptosystem
Jessalyn Bolkema
H. Gluesing-Luerssen
C. Kelley
Kristin E. Lauter
Beth Malmskog
J. Rosenthal
58
18
0
15 Dec 2016
Polynomial-Time Key Recovery Attack on the Faure-Loidreau Scheme based
  on Gabidulin Codes
Polynomial-Time Key Recovery Attack on the Faure-Loidreau Scheme based on Gabidulin Codes
Philippe Gaborit
A. Otmani
Hervé Talé Kalachi
59
32
0
24 Jun 2016
Quantum Resistant Random Linear Code Based Public Key Encryption Scheme
  RLCE
Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE
Yongge Wang
58
48
0
28 Dec 2015
A Polynomial-Time Attack on the BBCRS Scheme
A Polynomial-Time Attack on the BBCRS Scheme
Alain Couvreur
A. Otmani
J. Tillich
Valérie Gauthier
75
36
0
15 Jan 2015
Cryptanalysis of public-key cryptosystems that use subcodes of algebraic
  geometry codes
Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes
Alain Couvreur
Irene Márquez-Corbella
R. Pellikaan
49
18
0
29 Sep 2014
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
Alain Couvreur
A. Otmani
J. Tillich
93
86
0
13 Feb 2014
An efficient attack of a McEliece cryptosystem variant based on
  convolutional codes
An efficient attack of a McEliece cryptosystem variant based on convolutional codes
Grégory Landais
J. Tillich
AAML
87
56
0
20 Feb 2013
Enhanced public key security for the McEliece cryptosystem
Enhanced public key security for the McEliece cryptosystem
Marco Baldi
Marco Bianchi
F. Chiaraluce
J. Rosenthal
D. Schipani
128
105
0
11 Aug 2011
1