ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1402.3264
  4. Cited By
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
v1v2 (latest)

Polynomial Time Attack on Wild McEliece Over Quadratic Extensions

13 February 2014
Alain Couvreur
A. Otmani
J. Tillich
ArXiv (abs)PDFHTML

Papers citing "Polynomial Time Attack on Wild McEliece Over Quadratic Extensions"

22 / 22 papers shown
Title
The syzygy distinguisher
The syzygy distinguisher
H. Randriambololona
65
5
0
22 Jul 2024
Lossy Cryptography from Code-Based Assumptions
Lossy Cryptography from Code-Based Assumptions
Quang Dao
Aayush Jain
66
6
0
06 Feb 2024
Quantum-safe Encryption: A New Method to Reduce Complexity and/or
  Improve Security Level
Quantum-safe Encryption: A New Method to Reduce Complexity and/or Improve Security Level
A. Khandani
75
1
0
29 Jan 2024
Injective Rank Metric Trapdoor Functions with Homogeneous Errors
Injective Rank Metric Trapdoor Functions with Homogeneous Errors
Étienne Burle
Philippe Gaborit
Younes Hatri
A. Otmani
58
1
0
13 Oct 2023
A tiny public key scheme based on Niederreiter Cryptosystem
A tiny public key scheme based on Niederreiter Cryptosystem
Arash Khalvan
Amirhossein Zali
Mahmoud Ahmadian-Attari
18
1
0
10 Oct 2023
A new approach based on quadratic forms to attack the McEliece
  cryptosystem
A new approach based on quadratic forms to attack the McEliece cryptosystem
Alain Couvreur
Rocco Mora
J. Tillich
98
12
0
17 Jun 2023
Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding
Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding
Maxime Bombar
Geoffroy Couteau
Alain Couvreur
Clément Ducros
72
13
0
06 Jun 2023
An extension of Overbeck's attack with an application to cryptanalysis
  of Twisted Gabidulin-based schemes
An extension of Overbeck's attack with an application to cryptanalysis of Twisted Gabidulin-based schemes
Alain Couvreur
Ilaria Zappatore
64
1
0
02 May 2023
Polynomial time key-recovery attack on high rate random alternant codes
Polynomial time key-recovery attack on high rate random alternant codes
M. Bardet
Rocco Mora
J. Tillich
142
12
0
28 Apr 2023
On the dimension and structure of the square of the dual of a Goppa code
On the dimension and structure of the square of the dual of a Goppa code
Rocco Mora
J. Tillich
38
17
0
25 Nov 2021
On the security of subspace subcodes of Reed-Solomon codes for public
  key encryption
On the security of subspace subcodes of Reed-Solomon codes for public key encryption
Alain Couvreur
Matthieu Lequesne
72
11
0
12 Sep 2020
Algebraic geometry codes and some applications
Algebraic geometry codes and some applications
Alain Couvreur
H. Randriambololona
63
11
0
02 Sep 2020
Encryption Scheme Based on Expanded Reed-Solomon Codes
Encryption Scheme Based on Expanded Reed-Solomon Codes
Karan Khathuria
J. Rosenthal
Violetta Weger
90
23
0
03 Jun 2019
Practical Algebraic Attack on DAGS
Practical Algebraic Attack on DAGS
M. Bardet
Manon Bertin
Alain Couvreur
A. Otmani
51
4
0
09 May 2019
Recovering short secret keys of RLCE in polynomial time
Recovering short secret keys of RLCE in polynomial time
Alain Couvreur
Matthieu Lequesne
J. Tillich
42
18
0
29 May 2018
An efficient structural attack on NIST submission DAGS
An efficient structural attack on NIST submission DAGS
Élise Barelli
Alain Couvreur
58
18
0
14 May 2018
PKC-PC: A Variant of the McEliece Public Key Cryptosystem based on Polar
  Codes
PKC-PC: A Variant of the McEliece Public Key Cryptosystem based on Polar Codes
Reza Hooshmand
Masoumeh Koochak Shooshtari
M. R. Aref
44
19
0
20 Dec 2017
Efficient Encryption from Random Quasi-Cyclic Codes
Efficient Encryption from Random Quasi-Cyclic Codes
Carlos Aguilar-Melchor
Olivier Blazy
Jean-Christophe Deneuville
Philippe Gaborit
Gilles Zémor
60
113
0
16 Dec 2016
Variations of the McEliece Cryptosystem
Variations of the McEliece Cryptosystem
Jessalyn Bolkema
H. Gluesing-Luerssen
C. Kelley
Kristin E. Lauter
Beth Malmskog
J. Rosenthal
61
18
0
15 Dec 2016
Polynomial-Time Key Recovery Attack on the Faure-Loidreau Scheme based
  on Gabidulin Codes
Polynomial-Time Key Recovery Attack on the Faure-Loidreau Scheme based on Gabidulin Codes
Philippe Gaborit
A. Otmani
Hervé Talé Kalachi
66
32
0
24 Jun 2016
Quantum Resistant Random Linear Code Based Public Key Encryption Scheme
  RLCE
Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE
Yongge Wang
66
48
0
28 Dec 2015
A Polynomial-Time Attack on the BBCRS Scheme
A Polynomial-Time Attack on the BBCRS Scheme
Alain Couvreur
A. Otmani
J. Tillich
Valérie Gauthier
75
36
0
15 Jan 2015
1