搜索结果: 1-15 共查到“McEliece”相关记录32条 . 查询时间(0.089 秒)
Reducing the Key Size of McEliece Cryptosystem from Goppa Codes via Permutations
McEliece cryptosystem automorphism-incuded Goppa codes quasi-cyclic
font style='font-size:12px;'>
2018/11/2
In this paper, we propose a new general construction to reduce the public key size of McEliece-based schemes based on Goppa codes. In particular, we generalize the ideas of automorphism-induced Goppa ...
基于量子BCH码的McEliece及Niederreiter公钥密码算法研究
CSS构造 量子BCH码 基于纠错码公钥密码体制 抗量子攻击 数字签名
font style='font-size:12px;'>
2019/1/18
针对量子计算攻击对传统密码体制的安全威胁,设计出一类抗量子攻击的McEliece公钥密码体制,因为量子计算没有攻击McEliece公钥密码体制的多项式时间算法。给出了3类量子BCH码的生成算法,第1类是一般性量子BCH码生成算法,第2类是特殊的对称量子BCH码生成算法,第3类是特殊的非对称量子BCH码生成算法。以本文生成的非对称量子BCH码为基础,设计出量子McEliece公钥密码体制和量子Nie...
DRANKULA: a McEliece-like rank metric based cryptosystem implementation
Code-based cryptography Public key cryptography Cryptosystem
font style='font-size:12px;'>
2018/8/28
We present and analyze the performance of DRANKULA, a McEliece-like cryptosystem implementation using \textit{rank metric} instead of Hamming distance. Namely, we use the scheme proposed by Loidreau i...
A Reaction Attack on the QC-LDPC McEliece Cryptosystem
QC-LDPC McEliece cryptosystem reaction attack soft-decision decoding
font style='font-size:12px;'>
2017/6/2
Guo et al. recently presented a reaction attack against the QC-MDPC McEliece cryptosystem. Their attack is based on the observation that when a bit-flipping decoding algorithm is used in the QC-MDPC M...
Revised Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes
public-key cryptography code based public key encryption
font style='font-size:12px;'>
2017/3/2
Recently, Wang (2016) introduced a random linear code based quantum resistant public encryption scheme RLCE which is a variant of McEliece encryption scheme. In this paper, we introduce a revised vers...
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
public-key cryptography wild McEliece cryptosystem filtration
font style='font-size:12px;'>
2016/1/25
We present a polynomial time structural attack against the McEliece system
based on Wild Goppa codes from a quadratic finite field extension. This attack uses the fact
that such codes can be disting...
Structural Cryptanalysis of McEliece Schemes with Compact Keys
public-key cryptography McEliece cryptosystem algebraic cryptanalysis
font style='font-size:12px;'>
2016/1/25
A very popular trend in code-based cryptography is to decrease the public-key size by
focusing on subclasses of alternant/Goppa codes which admit a very compact public matrix, typically
quasi-cyclic...
McEliece in the world of Escher
Public Key Cryptography McEliece PKC
font style='font-size:12px;'>
2016/1/9
We present a new family of linear binary codes of length n and dimension k accompanied with
a fast list decoding algorithm that can correct up to n
2
errors in a bounded channel with an error densi...
Differential Power Analysis of a McEliece Cryptosystem
Differential Power Analysis McEliece Cryptosystem QC-MDPC Codes
font style='font-size:12px;'>
2016/1/8
This work presents the first differential power analysis of an implementation of the McEliece
cryptosystem. Target of this side-channel attack is a state-of-the-art FPGA implementation of the ef-
fi...
A note on CCA2-protected McEliece Cryptosystem with a systematic public key
cryptanalysis public-key cryptography McEliece cryptosystem
font style='font-size:12px;'>
2016/1/7
We show that the plaintext of some of the proposed CCA2 conversions of McEliece cryptosystem
with a public key in systematic form can be recovered faster than with a general linear
decoding. This is...
Toward Secure Implementation of McEliece Decryption
McEliece Extended Euclidean Algorithm timing attacks
font style='font-size:12px;'>
2016/1/3
We analyse the security regarding timing attacks of implementations
of the decryption in McEliece PKC with binary Goppa codes.
First, we review and extend the existing attacks, both on the messages
...
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
MDPC LDPC FPGA
font style='font-size:12px;'>
2015/12/30
In the last years code-based cryptosystems were established as promising alternatives for
asymmetric cryptography since they base their security on well-known NP-hard problems and still
show decent ...
Masking Large Keys in Hardware: A Masked Implementation of McEliece
Threshold Implementation McEliece Cryptosystem QC-MDPC Codes
font style='font-size:12px;'>
2015/12/22
Instantiations of the McEliece cryptosystem which are considered computationally secure
even in a post-quantum era still require hardening against side channel attacks for practical applications.
Re...
Vulnerabilities of ``McEliece in the World of Escher"
Information Set Decoding Code-based Cryptography McEliece
font style='font-size:12px;'>
2015/12/22
Recently, Gligoroski et al. proposed code-based encryption and signature
schemes using list decoding, blockwise triangular private keys, and a
nonuniform error pattern based on “generalized error se...
Comparison Between Irreducible and Separable Goppa Code in McEliece Cryptosystem
McEliece cryptosystem Goppa code separable irreducible
font style='font-size:12px;'>
2015/12/21
The McEliece cryptosystem is an asymmetric type of cryptography based on
error correction code. The classical McEliece used irreducible binary Goppa code which
considered unbreakable until now espec...