[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

Algebraic properties of polar codes from a new polynomial formalism

M Bardet, V Dragoi, A Otmani… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Polar codes form a very powerful family of codes with a low complexity decoding algorithm
that attains many information theoretic limits in error correction and source coding. These …

[图书][B] Concise encyclopedia of coding theory

WC Huffman, JL Kim, P Solé - 2021 - api.taylorfrancis.com
Most coding theory experts date the origin of the subject with the 1948 publication of A
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …

Revisiting algebraic attacks on MinRank and on the rank decoding problem

M Bardet, P Briaud, M Bros, P Gaborit… - Designs, Codes and …, 2023 - Springer
Abstract The Rank Decoding problem (RD) is at the core of rank-based cryptography.
Cryptosystems such as ROLLO and RQC, which made it to the second round of the NIST …

Polynomial time attack on wild McEliece over quadratic extensions

A Couvreur, A Otmani, JP Tillich - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We present a polynomial-time structural attack against the McEliece system based on Wild
Goppa codes defined over a quadratic finite field extension. We show that such codes can …

Enhanced public key security for the McEliece cryptosystem

M Baldi, M Bianchi, F Chiaraluce, J Rosenthal… - Journal of …, 2016 - Springer
This paper studies a variant of the McEliece cryptosystem able to ensure that the code used
as the public key is no longer permutation equivalent to the secret code. This increases the …

A new approach based on quadratic forms to attack the McEliece cryptosystem

A Couvreur, R Mora, JP Tillich - … Conference on the Theory and Application …, 2023 - Springer
We introduce a novel algebraic approach for attacking the McEliece cryptosystem which is
currently at the 4-th round of the NIST competition. The contributions of the article are …

Polynomial time key-recovery attack on high rate random alternant codes

M Bardet, R Mora, JP Tillich - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
A long standing open question is whether the distinguisher of high rate alternant codes or
Goppa codes from Faugère, Gauthier-Uma na, Otmani, Perret, and Tillich in 2011 can be …

Correlated pseudorandomness from the hardness of quasi-abelian decoding

M Bombar, G Couteau, A Couvreur… - Annual International …, 2023 - Springer
A recent paradigm put forth by Boyle et al.(CCS 2018, Crypto 2019) showed how
pseudorandom correlation generators (PCG) can be used to generate large amounts of …

Cryptanalysis of the McEliece public key cryptosystem based on polar codes

M Bardet, J Chaulet, V Dragoi, A Otmani… - … PQCrypto 2016, Fukuoka …, 2016 - Springer
Polar codes discovered by Arikan form a very powerful family of codes attaining many
information theoretic limits in the fields of error correction and source coding. They have in …