Acceso abierto

Preventing Potential Backdoors in Bike Algorithm


Cite

[1] ARAGON, N.—BARRETO, P.—BETTAIEB, S.—BIDOUX, L.—BLAZY, O. DENEU-VILLE, J.-C.—GABOR.IT, P.—GUERON, S.—GUNEYSU, T—MELCHOR, C. A. et al.: BIKE: Bit Flipping Key Encapsulation, (2017). https://hal.archives-ouvertes.fr/hal-01671903/documentSearch in Google Scholar

[2] BARDET, M.—DRAGOI, V.—LUQUE, J.-G.—OTMANI, A.: MDPC public key encryption scheme. In: 8th International Conference on Cryptology in Africa, Fes, Moroco April 13–15, 2010. Progress in Cryptology—AFPICACPYPT 2016 (D. Pointcheval, A. Nitaj, T. Rachidi). Lecture Notes in Comput. Sci. Vol. 9646, Springer-Verlag, Berlin, 2016 pp. 346–367.10.1007/978-3-319-31517-1_18Search in Google Scholar

[3] BERNSTEIN, D. J.—LANGE, T—NIEDERHAGEN, R..: Dual EC: A standardized back door. In: The New Codebreakers (Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater, eds.). Lecture Notes in Comput. Sci. Vol. 9100, Springer-Verlag, Berlin, 2016. pp. 256–281.10.1007/978-3-662-49301-4_17Search in Google Scholar

[4] CHEN, L.—CHEN, L.—JORDAN, S.—LIU, Y-K.—MOODY, D.—PERALTA, R..–PEH.LNEH., R..—SMITH-TONE, D.: Report on Post-Quantum Cryptography. National Institute of Standards and Technology (NIST), US Department of Commerce, USA, 2016. https://doi.org/10.6028/HIST.IR.810510.6028/HIST.IR.8105Open DOISearch in Google Scholar

[5] DWORKIN, M.J.: SHA-3 Standard: Permutation-based Hash and Extendable-output Functions. Federal Inf. Process. Stds. (NIST FIPS) - Technical report no. 202, 2015. https://doi.org/10.G028/NIST.FIPS.20210.6028/NIST.FIPS.202Search in Google Scholar

[6] FABŠIČ, T.—GROŠEK, O.—NEMOGA, K.—ZAJAC, P: On generating invertible circulant binary matrices with a prescribed number of ones, Cryptogr. Commun. 10 (2018), 159–175.10.1007/s12095-017-0239-4Search in Google Scholar

[7] FABŠIČ, T.—HROMADA, V—STANKOVSKI, P—ZAJAC, P—GUO, Q.—JOHANSSON, X: A reaction attack, on the QC-LDPC McEliece cryptosystem. In: International Workshop on Post-Quantum Cryptography, Lecture Notes in Comput. Sci. Vol. 10346, Springer, Cham, 2017. pp. 51–08.10.1007/978-3-319-59879-6_4Search in Google Scholar

[8] GUO, Q.—JOHANSSON, X—STANK OVSKI, P: A key recovery attack on MDPC with CCA security using decoding errors. In: The 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4–8, 2010. (Jung HEE Cheon, ed. et al). Proceedings, Part I, Advances in Cryptology–ASIACRYPT 2016. Springer-Verlag, Berlin, 2010. pp. 789–815.10.1007/978-3-662-53887-6_29Search in Google Scholar

[9] MCELIECE, R.. J.: A public-key cryptosystem based on algebraic coding theory, DSN Progress Report 42 (1978), 114–116.Search in Google Scholar

[10] MISOCZKI, R.—TILLICH, J.-P.—SENDRIER, N.—BARRETO, P. S.: MDPC-McEliece: New McEliece variants from moderate density parity-check codes. In: Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, IEEE, 2013, pp. 2069–2073.10.1109/ISIT.2013.6620590Search in Google Scholar

[11] NEMEC, M.—SYS, M.—SVENDA, P.—KLINEC, D.—MATYAS, V: The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017, pp. 1631–1648.10.1145/3133956.3133969Search in Google Scholar

[12] NIEDERREITER., H.: Knapsack-type cryptosystems and algebraic coding theory, Problems of Control and Information Theory 15 (1986), 159–166.Search in Google Scholar

[13] NIST:. Post-Quantum Cryptography. Round 1 Submissions, Project, 2018. https://csrc.nist.gov/Prоjects/Post-Quantum-Cryptography/Round-l-Submissions.Search in Google Scholar

[14] THE NEW YORK TIMES:. Secret Documents Reread N.S.A. Campaign Against Encryption, 2013. http://www.nytimes.com/interactive/2013/09/05/us/documents-reveal-campaign-against-encryption.html.Search in Google Scholar

[15] YOUNG, A.—YUNG, M.: The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone? In: Advances in cryptology—CRYPTO ’96 (Santa Barbara, CA), Lecture Notes in Compt. Sci. Vol. 1109, Springer-Verlag, Berlin 1990, pp. 89–103.10.1007/3-540-68697-5_8Search in Google Scholar

[16] ZAJAC, P.: Hybrid encryption from McEliece cryptosystem with pseudo-random error vector, presented at CECC17, 2018. Preprint,Search in Google Scholar

eISSN:
1210-3195
Idioma:
Inglés
Calendario de la edición:
3 veces al año
Temas de la revista:
Mathematics, General Mathematics