Niederreiter cryptosystem

Results: 9



#Item
1

FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes Wen Wang1, Jakub Szefer1, and Ruben Niederhagen2 1. Yale University, USA 2. Fraunhofer Institute SIT, Germany April 9, 2018

Add to Reading List

Source URL: www.math.fau.edu

Language: English - Date: 2018-04-24 10:30:54
    2Security / Paillier cryptosystem / Merkle–Hellman knapsack cryptosystem / Niederreiter cryptosystem / Cryptography / Post-quantum cryptography / Cryptosystem / RSA / Semantic security / Public-key cryptography / Cyberwarfare / Applied mathematics

    Noname manuscript No. (will be inserted by the editor) Generalizing Cryptosystems Based on the Subset Sum Problem Aniket Kate · Ian Goldberg

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2011-05-05 15:39:42
    3Information theory / Mathematics / Low-density parity-check code / Reed–Solomon error correction / Niederreiter cryptosystem / McEliece cryptosystem / Parity-check matrix / Hamming / Linear code / Coding theory / Cryptography / Error detection and correction

    Smaller Keys for Code-based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices Stefan Heyse, Ingo von Maurich, Tim G¨ uneysu Horst G¨ ortz Institute for IT-Security

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-05-04 16:50:34
    4Coding theory / Error detection and correction / Theoretical computer science / Numerical analysis / McEliece cryptosystem / Post-quantum cryptography / Niederreiter cryptosystem / List decoding / Horner scheme / Mathematics / Public-key cryptography / Applied mathematics

    Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke 1 2

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-08-07 11:04:10
    5McEliece cryptosystem / Post-quantum cryptography / Ciphertext / Chosen-ciphertext attack / RSA / Lattice problem / Cryptanalysis / Niederreiter cryptosystem / Rabin cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

    Reaction Attacks Against Several Public-Key Cryptosystems Chris Hall1 , Ian Goldberg2 , and Bruce Schneier1 1 Counterpane Systems

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:31
    6Mathematics / Public-key cryptography / Error detection and correction / Algebra / Post-quantum cryptography / McEliece cryptosystem / Goppa code / Niederreiter cryptosystem / Reed–Solomon error correction / Coding theory / Abstract algebra / Finite fields

    Wild McEliece Incognito Daniel J. Bernstein1 , Tanja Lange2 , and Christiane Peters3 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2011-09-15 08:54:20
    7McEliece cryptosystem / Post-quantum cryptography / Semantic security / Chosen-ciphertext attack / Cryptanalysis / Cryptographic hash function / Ciphertext / Niederreiter cryptosystem / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

    A note on CCA2-protected McEliece cryptosystem with a systematic public key Pavol Zajac? UIM FEI STU, Ilkovicova 3, 81219 Bratislava, Slovakia [removed]

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-08-22 04:29:49
    8Group theory / Public-key cryptography / Representation theory / Lie groups / McEliece cryptosystem / Niederreiter cryptosystem / Hidden subgroup problem / Permutation / Group representation / Abstract algebra / Algebra / Mathematics

    The McEliece Cryptosystem Resists Quantum Fourier Sampling Attack Cristopher Moore University of New Mexico and the Santa Fe Institute Joint work with

    Add to Reading List

    Source URL: tuvalu.santafe.edu

    Language: English - Date: 2011-04-14 11:01:36
    9Ciphertext indistinguishability / McEliece cryptosystem / Adaptive chosen-ciphertext attack / Semantic security / Optimal asymmetric encryption padding / Probabilistic encryption / Post-quantum cryptography / RSA / Paillier cryptosystem / Cryptography / Public-key cryptography / Niederreiter cryptosystem

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks[removed]Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: [removed]sec.274 RESEARCH ARTICLE

    Add to Reading List

    Source URL: bbcr.uwaterloo.ca

    Language: English - Date: 2011-07-16 17:53:26
    UPDATE