Abstract. We present a new family of linear binary codes of length n and dimension k accompanied with a fast list decoding algorithm that can correct up to n2 errors in a bounded channel with an error density ρ. The decisional problem of decoding random codes using these generalized error sets is NP-complete. Next we use the properties of these codes to design both an encryption scheme and a signature scheme. Although in the open literature there have been several proposals how to produce digital signatures from the McEliece public key scheme, as far as we know, this is the first public key scheme based on codes where signatures are produced in a straightforward manner from the decryption procedure of the scheme. The security analysis of ou...
We present a general purpose algorithm for finding low-weight codewords as well as for decoding a re...
International audienceCode-based cryptography is among the most attractive post-quantum cryptographi...
In this paper, we seek to understand some basic principles of coding theory. Specifically, we define...
Abstract. We present a new family of linear binary codes of length n and dimension k accompanied wit...
Recently, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding...
A large part in the design of secure cryptographic primitives consists in identifying hard algorithm...
Abstract. McEliece is one of the oldest known public key cryptosystems. Though it was less widely st...
Abstract McEliece proposed the first public-key cryptosystem based on linear error-correcting codes....
McEliece cryptosystem is the first public-key cryptosystem based on linear error-correcting codes. A...
Abstract. McEliece is one of the oldest known public key cryptosys-tems. Though it was less widely s...
International audienceThe McEliece cryptosystem is one of the oldest public-key cryptosystem ever de...
In this thesis we view the statistical decoding algorithm, which tries to solve the general decoding...
International audienceCode-based cryptography is among the most attractive post-quantum cryptographi...
In the context of public key cryptography, the McEliece cryptosystem represents a very smart solutio...
Abstract In this paper we give an overview of some of the cryptographic applications which were deri...
We present a general purpose algorithm for finding low-weight codewords as well as for decoding a re...
International audienceCode-based cryptography is among the most attractive post-quantum cryptographi...
In this paper, we seek to understand some basic principles of coding theory. Specifically, we define...
Abstract. We present a new family of linear binary codes of length n and dimension k accompanied wit...
Recently, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding...
A large part in the design of secure cryptographic primitives consists in identifying hard algorithm...
Abstract. McEliece is one of the oldest known public key cryptosystems. Though it was less widely st...
Abstract McEliece proposed the first public-key cryptosystem based on linear error-correcting codes....
McEliece cryptosystem is the first public-key cryptosystem based on linear error-correcting codes. A...
Abstract. McEliece is one of the oldest known public key cryptosys-tems. Though it was less widely s...
International audienceThe McEliece cryptosystem is one of the oldest public-key cryptosystem ever de...
In this thesis we view the statistical decoding algorithm, which tries to solve the general decoding...
International audienceCode-based cryptography is among the most attractive post-quantum cryptographi...
In the context of public key cryptography, the McEliece cryptosystem represents a very smart solutio...
Abstract In this paper we give an overview of some of the cryptographic applications which were deri...
We present a general purpose algorithm for finding low-weight codewords as well as for decoding a re...
International audienceCode-based cryptography is among the most attractive post-quantum cryptographi...
In this paper, we seek to understand some basic principles of coding theory. Specifically, we define...