Polynomial time attack on wild McEliece over quadratic extensions
We present a polynomial-time structural attack against the McEliece system based on Wild
Goppa codes defined over a quadratic finite field extension. We show that such codes can …
Goppa codes defined over a quadratic finite field extension. We show that such codes can …
The real-life dangers of augmented reality
EE Sabelman, R Lam - IEEE Spectrum, 2015 - ieeexplore.ieee.org
You know your cellphone can distract you and that you shouldn't be texting or surfing the
Web while walking down a crowded street or driving a car. Augmented reality-in the form of …
Web while walking down a crowded street or driving a car. Augmented reality-in the form of …
Cryptanalysis of McEliece cryptosystem based on algebraic geometry codes and their subcodes
A Couvreur, I Márquez-Corbella… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We give polynomial time attacks on the McEliece public key cryptosystem-based either on
algebraic geometry (AG) codes or on small co-dimensional subcodes of AG codes. These …
algebraic geometry (AG) codes or on small co-dimensional subcodes of AG codes. These …
Theoretical Analysis of Decoding Failure Rate of Non–binary QC–MDPC Codes
K Vedenev, Y Kosolapov - Code-Based Cryptography Workshop, 2023 - Springer
In this paper, we study the decoding failure rate (DFR) of non-binary QC-MDPC codes using
theoretical tools, extending the results of previous binary QC-MDPC code studies. The …
theoretical tools, extending the results of previous binary QC-MDPC code studies. The …
Variations of the McEliece cryptosystem
J Bolkema, H Gluesing-Luerssen, CA Kelley… - Algebraic Geometry for …, 2017 - Springer
Two variations of the McEliece cryptosystem are presented. The first is based on a relaxation
of the column permutation in the classical McEliece scrambling process. This is done in such …
of the column permutation in the classical McEliece scrambling process. This is done in such …
The computer chip that never forgets
In 1945, mathematician John von Neumann wrote down a very simple recipe for a computer.
It would contain two key components: a central processing unit to perform calculations and …
It would contain two key components: a central processing unit to perform calculations and …
Design criteria of a new code-based KEM
V Vysotskaya, I Chizhov - Journal of Computer Virology and Hacking …, 2024 - Springer
The advances in quantum technologies became a threat to cryptosystems based on number-
theoretic approach. Therefore, the development of post-quantum algorithms is currently …
theoretic approach. Therefore, the development of post-quantum algorithms is currently …
Error-correcting pairs for a public-key cryptosystem
R Pellikaan, I Márquez-Corbella - Journal of Physics: Conference …, 2017 - iopscience.iop.org
Code-based Cryptography (CBC) is a powerful and promising alternative for quantum
resistant cryptography. Indeed, together with lattice-based cryptography, multivariate …
resistant cryptography. Indeed, together with lattice-based cryptography, multivariate …
On linear codes with random multiplier vectors and the maximum trace dimension property
Let C be a linear code of length n and dimension k over the finite field F qm. The trace code
Tr (C) is a linear code of the same length n over the subfield F q. The obvious upper bound …
Tr (C) is a linear code of the same length n over the subfield F q. The obvious upper bound …
[PDF][PDF] A code-based cryptosystem using GRS codes
V Weger - 2016 - user.math.uzh.ch
Using GRS codes directly in the McEliece system is broken by the attack of Sidelnikov and
Shestakov. Rosenthal et al. proposed a variant of the McEliece cryptosystem, denoted by the …
Shestakov. Rosenthal et al. proposed a variant of the McEliece cryptosystem, denoted by the …