Polynomial time attack on wild McEliece over quadratic extensions

A Couvreur, A Otmani, JP Tillich - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We present a polynomial-time structural attack against the McEliece system based on Wild
Goppa codes defined over a quadratic finite field extension. We show that such codes can …

The real-life dangers of augmented reality

EE Sabelman, R Lam - IEEE Spectrum, 2015 - ieeexplore.ieee.org
You know your cellphone can distract you and that you shouldn't be texting or surfing the
Web while walking down a crowded street or driving a car. Augmented reality-in the form of …

Cryptanalysis of McEliece cryptosystem based on algebraic geometry codes and their subcodes

A Couvreur, I Márquez-Corbella… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We give polynomial time attacks on the McEliece public key cryptosystem-based either on
algebraic geometry (AG) codes or on small co-dimensional subcodes of AG codes. These …

Theoretical Analysis of Decoding Failure Rate of Non–binary QC–MDPC Codes

K Vedenev, Y Kosolapov - Code-Based Cryptography Workshop, 2023 - Springer
In this paper, we study the decoding failure rate (DFR) of non-binary QC-MDPC codes using
theoretical tools, extending the results of previous binary QC-MDPC code studies. The …

Variations of the McEliece cryptosystem

J Bolkema, H Gluesing-Luerssen, CA Kelley… - Algebraic Geometry for …, 2017 - Springer
Two variations of the McEliece cryptosystem are presented. The first is based on a relaxation
of the column permutation in the classical McEliece scrambling process. This is done in such …

The computer chip that never forgets

P Khalili, KL Wang - Ieee Spectrum, 2015 - ieeexplore.ieee.org
In 1945, mathematician John von Neumann wrote down a very simple recipe for a computer.
It would contain two key components: a central processing unit to perform calculations and …

Design criteria of a new code-based KEM

V Vysotskaya, I Chizhov - Journal of Computer Virology and Hacking …, 2024 - Springer
The advances in quantum technologies became a threat to cryptosystems based on number-
theoretic approach. Therefore, the development of post-quantum algorithms is currently …

Error-correcting pairs for a public-key cryptosystem

R Pellikaan, I Márquez-Corbella - Journal of Physics: Conference …, 2017 - iopscience.iop.org
Code-based Cryptography (CBC) is a powerful and promising alternative for quantum
resistant cryptography. Indeed, together with lattice-based cryptography, multivariate …

On linear codes with random multiplier vectors and the maximum trace dimension property

M Erdélyi, P Hegedüs, SZ Kiss… - Journal of Mathematical …, 2024 - degruyter.com
Let C be a linear code of length n and dimension k over the finite field F qm. The trace code
Tr (C) is a linear code of the same length n over the subfield F q. The obvious upper bound …

[PDF][PDF] A code-based cryptosystem using GRS codes

V Weger - 2016 - user.math.uzh.ch
Using GRS codes directly in the McEliece system is broken by the attack of Sidelnikov and
Shestakov. Rosenthal et al. proposed a variant of the McEliece cryptosystem, denoted by the …