搜索结果: 1-15 共查到“军队指挥学 McEliece”相关记录28条 . 查询时间(0.843 秒)
Reducing the Key Size of McEliece Cryptosystem from Goppa Codes via Permutations
McEliece cryptosystem automorphism-incuded Goppa codes quasi-cyclic
2018/11/2
In this paper, we propose a new general construction to reduce the public key size of McEliece-based schemes based on Goppa codes. In particular, we generalize the ideas of automorphism-induced Goppa ...
DRANKULA: a McEliece-like rank metric based cryptosystem implementation
Code-based cryptography Public key cryptography Cryptosystem
2018/8/28
We present and analyze the performance of DRANKULA, a McEliece-like cryptosystem implementation using \textit{rank metric} instead of Hamming distance. Namely, we use the scheme proposed by Loidreau i...
A Reaction Attack on the QC-LDPC McEliece Cryptosystem
QC-LDPC McEliece cryptosystem reaction attack soft-decision decoding
2017/6/2
Guo et al. recently presented a reaction attack against the QC-MDPC McEliece cryptosystem. Their attack is based on the observation that when a bit-flipping decoding algorithm is used in the QC-MDPC M...
Revised Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes
public-key cryptography code based public key encryption
2017/3/2
Recently, Wang (2016) introduced a random linear code based quantum resistant public encryption scheme RLCE which is a variant of McEliece encryption scheme. In this paper, we introduce a revised vers...
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
public-key cryptography wild McEliece cryptosystem filtration
2016/1/25
We present a polynomial time structural attack against the McEliece system
based on Wild Goppa codes from a quadratic finite field extension. This attack uses the fact
that such codes can be disting...
Structural Cryptanalysis of McEliece Schemes with Compact Keys
public-key cryptography McEliece cryptosystem algebraic cryptanalysis
2016/1/25
A very popular trend in code-based cryptography is to decrease the public-key size by
focusing on subclasses of alternant/Goppa codes which admit a very compact public matrix, typically
quasi-cyclic...
We present a new family of linear binary codes of length n and dimension k accompanied with
a fast list decoding algorithm that can correct up to n
2
errors in a bounded channel with an error densi...
Differential Power Analysis of a McEliece Cryptosystem
Differential Power Analysis McEliece Cryptosystem QC-MDPC Codes
2016/1/8
This work presents the first differential power analysis of an implementation of the McEliece
cryptosystem. Target of this side-channel attack is a state-of-the-art FPGA implementation of the ef-
fi...
A note on CCA2-protected McEliece Cryptosystem with a systematic public key
cryptanalysis public-key cryptography McEliece cryptosystem
2016/1/7
We show that the plaintext of some of the proposed CCA2 conversions of McEliece cryptosystem
with a public key in systematic form can be recovered faster than with a general linear
decoding. This is...
Toward Secure Implementation of McEliece Decryption
McEliece Extended Euclidean Algorithm timing attacks
2016/1/3
We analyse the security regarding timing attacks of implementations
of the decryption in McEliece PKC with binary Goppa codes.
First, we review and extend the existing attacks, both on the messages
...
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
MDPC LDPC FPGA
2015/12/30
In the last years code-based cryptosystems were established as promising alternatives for
asymmetric cryptography since they base their security on well-known NP-hard problems and still
show decent ...
Masking Large Keys in Hardware: A Masked Implementation of McEliece
Threshold Implementation McEliece Cryptosystem QC-MDPC Codes
2015/12/22
Instantiations of the McEliece cryptosystem which are considered computationally secure
even in a post-quantum era still require hardening against side channel attacks for practical applications.
Re...
Vulnerabilities of ``McEliece in the World of Escher"
Information Set Decoding Code-based Cryptography McEliece
2015/12/22
Recently, Gligoroski et al. proposed code-based encryption and signature
schemes using list decoding, blockwise triangular private keys, and a
nonuniform error pattern based on “generalized error se...
Comparison Between Irreducible and Separable Goppa Code in McEliece Cryptosystem
McEliece cryptosystem Goppa code separable irreducible
2015/12/21
The McEliece cryptosystem is an asymmetric type of cryptography based on
error correction code. The classical McEliece used irreducible binary Goppa code which
considered unbreakable until now espec...
The failure of McEliece PKC based on Reed-Muller codes.
Reed-Muller binary code McEliece cryptosystem
2014/3/13
This paper describes new algorithm for breaking McEliece cryptosystem, built on Reed-Muller binary code $RM(r, m)$, which receives the private key from the public key. The algorithm has complexity $O(...