INFORMAZIONI SU QUESTO ARTICOLO

Cita

[1] S. P. N. 984520, Secure Implementation of Post-Quantum Cryptography, 2013. http://147.175.106.232/nato/?q=node/27.Search in Google Scholar

[2] SHOR, P.: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, SIAM review 41 No. 2 (1999), 303-332.10.1137/S0036144598347011Search in Google Scholar

[3] McELIECE, R. J.: A Public-Key Cryptosystem based on Algebraic Coding Theory, DSN Progress Report 42 No. 44 (1978), 114-116, http://www.cs.colorado.edu/~jrblack/class/ csci7000/f03/papers/mceliece.pdf.Search in Google Scholar

[4] BERLEKAMP, E.–McELIECE, R.–van TILBORG, H.: On the Inherent Intractability of Certain Coding Problems, IEEE Transactions on Information Theory 24 No. 3 (May 1978), 384-386.10.1109/TIT.1978.1055873Search in Google Scholar

[5] REPKA, M.–CAYREL, P.-L.: Multidisciplinary Perspectives in Cryptology and Information Security, IGI Global, Ch. Cryptography based on Error Correcting Codes: a Survey, 2014, pp. 133-156.Search in Google Scholar

[6] ZAJAC, P.: A Note on CCA2-Protected McEliece Cryptosys-tem with a Systematic Public Key, Cryptology ePrint Archive, Report 2014/651, 2014 http://eprint.iacr.org/.Search in Google Scholar

[7] OUZAN, S.–BE'ERY, Y.: Moderate-Density Parity-Check Codes, CoRR abs/0911.3262 (2009).Search in Google Scholar

[8] NIEDERREITER, H.: Knapsack-Type Cryptosystems and Algebraic Coding Theory, Problems of Control and Information Theory 15 No. 2 (1986), 159-166.Search in Google Scholar

[9] BISWAS, B.–SENDRIER, N.: Mceliece Cryptosystem Implementation: Theory and Practice, in PQCrypto, ser. LNCS (J. Buchmann and J. Ding, eds.), vol. 5299, Springer, 2008, pp. 47-62.Search in Google Scholar

[10] STRENZKE, F.: Efficiency and Implementation Security of Code-Based Cryptosystems, PhD dissertation, Universität Darmstadt, Germany, 2013.Search in Google Scholar

[11] HEYSE, S.–von MAURICH, I.–GÜNEYSU, T.: Smaller Keys for Code-Based Cryptography: Qc-mdpc Mceliece Implementations on Embedded Devices, in CHES, ser. LNCS (G. Bertoni and J.-S. Coron, eds.), vol. 8086, Springer, 2013, pp. 273-292. SHOUP, V.: Ntl: A Library for Doing Number Theory (version 6.0.0), February 2013. http://www.shoup.net/ntl/. FRIGO, M.–JOHNSON, S. G.: The Design and Implementation of FFTW3, Proceedings of the IEEE 93 No. 2 (2005), 216-231, Special Issue on Program Generation, Optimization, and Platform Adaptation. http://www.fftw.org/.Search in Google Scholar

[14] EISENBARTH, T.–GÜNEYSU, T.–HEYSE, S.–PAAR, C.: Microeliece: Mceliece for Embedded Devices, in CHES, ser. LNCS (C. Clavier and K. Gaj, eds.), vol. 5747, Springer, 2009, pp. 49-64.Search in Google Scholar

STRENZKE, F.: A Smart Card Implementation of the mceliece pkc, in The 4th IFIP WG 11.2, Proceedings, ser. WISTP'10, Springer-Verlag, Berlin, Heidelberg, 2010, pp. 47-59.10.1007/978-3-642-12368-9_4Search in Google Scholar

[16] CAYERL, P.-L.: Code Based Cryptography, 2012, http://cayrel.net/research/code-based-cryptography/ code-based-cryptosystems/.Search in Google Scholar

[17] HEYSE, S.–GÜNEYSU, T.: Towards One Cycle Per Bit Asymmetric Encryption: Code-Based Cryptography on Re-configurable Hardware, in CHES, ser. LNCS (E. Prouff and P. Schaumont, eds.), vol. 7428, Springer, 2012, pp. 340-355.Search in Google Scholar

[18] ENGELBERT, D.–OVERBECK, R.–SCHMIDT, A.: A Summary of Mceliece-Type Cryptosystems and their Security, J. Mathematical Cryptology 1 No. 2 (2007), 151-199.Search in Google Scholar

[19] SENDRIER, N. Ed.: PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings, ser. LNCS, vol. 6061, Springer, 2010.Search in Google Scholar

[20] STRENZKE, F.: A Timing Attack against the Secret Permutation in the Mceliece pkc, in PQCrypto ser. LNCS (N. Sendrier, eds.), vol. 6061, Springer, 2010, pp. 95-107.Search in Google Scholar

[21] STRENZKE, F.: Timing Attacks Against the Syndrome Inversion in Code-Based Cryptosystems, in PQCrypto, ser. LNCS (P. Gaborit, ed.), vol. 7932, Springer, 2013, pp. 217-230.Search in Google Scholar

[22] STRENZKE, F.–TEWS, E.–MOLTER,H. G.–OVERBECK, R.–SHOUFAN, A.: Side Channels in the Mceliece pkc, in PQCrypto, ser. LNCS (J. Buchmann and J. Ding, eds.), vol. 5299, Springer, 2008, pp. 216-229.Search in Google Scholar

[23] GOPPA, V. D.: A New Class of Linear Error Correcting Codes, Probl. Pered. Inform. 6 (Sep 1970), 24-30.Search in Google Scholar

[24] ZAJAC, P.–JOKAY, M.: Computing Indexes and Periods of All Boolean Matrices up to Dimension n = 8, Computing and Informatics 31 No. 6 (2013), 1329-1344.Search in Google Scholar

[25] SEDGEWICK, R.: Permutation Generation Methods, ACM Comput. Surv. 9 No. 2 (June 1977), 137-164, http://doi.acm.org/10.1145/356689.356692.10.1145/356689.356692Search in Google Scholar

[26] KOBARA, K.–IMAI, H.: Semantically Secure Mceliece Public-Key Cryptosystems-Conversions for Mceliece pkc, in Public Key Cryptography, ser. LNCS (K. Kim, ed.), vol. 1992, Springer, 2001, pp. 19-35.Search in Google Scholar

[27] ZAJAC, P.: A New Method to Solve mrhs Equation Systems and its Connection to Group Factorization, J. Mathematical Cryptology 7 No. 4 (2013), 367-381.Search in Google Scholar

[28] PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings, ser. LNCS (J. Buchmann and J. Ding, eds.), vol. 5299, Springer, 2008.Search in Google Scholar

eISSN:
1339-309X
Lingua:
Inglese
Frequenza di pubblicazione:
6 volte all'anno
Argomenti della rivista:
Engineering, Introductions and Overviews, other