ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1501.03736
  4. Cited By
A Polynomial-Time Attack on the BBCRS Scheme

A Polynomial-Time Attack on the BBCRS Scheme

15 January 2015
Alain Couvreur
A. Otmani
J. Tillich
Valérie Gauthier
ArXiv (abs)PDFHTML

Papers citing "A Polynomial-Time Attack on the BBCRS Scheme"

9 / 9 papers shown
Title
On the security of subspace subcodes of Reed-Solomon codes for public
  key encryption
On the security of subspace subcodes of Reed-Solomon codes for public key encryption
Alain Couvreur
Matthieu Lequesne
69
11
0
12 Sep 2020
Encryption Scheme Based on Expanded Reed-Solomon Codes
Encryption Scheme Based on Expanded Reed-Solomon Codes
Karan Khathuria
J. Rosenthal
Violetta Weger
87
23
0
03 Jun 2019
On the security of a Loidreau's rank metric code based encryption scheme
On the security of a Loidreau's rank metric code based encryption scheme
Daniel Coggia
Alain Couvreur
41
16
0
07 Mar 2019
Recovering short secret keys of RLCE in polynomial time
Recovering short secret keys of RLCE in polynomial time
Alain Couvreur
Matthieu Lequesne
J. Tillich
39
18
0
29 May 2018
An efficient structural attack on NIST submission DAGS
An efficient structural attack on NIST submission DAGS
Élise Barelli
Alain Couvreur
55
18
0
14 May 2018
On Decoding Schemes for the MDPC-McEliece Cryptosystem
On Decoding Schemes for the MDPC-McEliece Cryptosystem
H. Bartz
G. Liva
28
19
0
17 Jan 2018
Variations of the McEliece Cryptosystem
Variations of the McEliece Cryptosystem
Jessalyn Bolkema
H. Gluesing-Luerssen
C. Kelley
Kristin E. Lauter
Beth Malmskog
J. Rosenthal
58
18
0
15 Dec 2016
Using Reed-Solomon codes in the $\left( U\mid U+V\right)$ construction
  and an application to cryptography
Using Reed-Solomon codes in the (U∣U+V)\left( U\mid U+V\right)(U∣U+V) construction and an application to cryptography
Irene Marquez Corbella
J. Tillich
27
0
0
29 Jan 2016
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
Alain Couvreur
A. Otmani
J. Tillich
93
86
0
13 Feb 2014
1