International audienceWe analyze a new key recovery attack against the Quasi-Cyclic MDPC McEliece scheme. Retrieving the secret key from the public data is usually tackled down using exponential time algorithms aiming to recover minimum weight codewords and thus constructing an equivalent code. We use here a different approach and give under certain hypothesis an algorithm that is able to solve a key equation relating the public key to the private key. We relate this equation to a well known problem the Rational Reconstruction Problem and therefore propose a natural solution based on the extended Euclidean algorithm. All private keys satisfying the hypothesis are declared weak keys. In the same time we give a precise number of weak keys and...
Abstract. In this paper, we present the cryptanalysis of a public key scheme based on a system of mu...
Abstract. A very popular trend in code-based cryptography is to decrease the public-key size by focu...
Abstract. Suppose that the private key of discrete logarithm-based or factoring-based public-key pri...
International audienceWe analyze a new key recovery attack against the Quasi-Cyclic MDPC McEliece sc...
We present a general purpose algorithm for finding low-weight codewords as well as for decoding a re...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention ...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention ...
International audienceWe cryptanalyse here two variants of the McEliece cryptosystem based on quasi-...
In this paper we investigate the invariant property of PRINTcipher first discovered by Leander et al...
International audienceIn this paper we propose a new approach to investigate the security of the McE...
International audienceSuppose that the private key of discrete logarithm-based or factoring-based pu...
In this paper we investigate the invariant property of PRINTcipher first discovered by Leander et al...
International audienceA very popular trend in code-based cryptography is to decrease the public-key ...
Abstract. A very popular trend in code-based cryptography is to decrease the public-key size by focu...
In this paper we investigate the invariant property of PRINTcipher initially discovered by Leander e...
Abstract. In this paper, we present the cryptanalysis of a public key scheme based on a system of mu...
Abstract. A very popular trend in code-based cryptography is to decrease the public-key size by focu...
Abstract. Suppose that the private key of discrete logarithm-based or factoring-based public-key pri...
International audienceWe analyze a new key recovery attack against the Quasi-Cyclic MDPC McEliece sc...
We present a general purpose algorithm for finding low-weight codewords as well as for decoding a re...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention ...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention ...
International audienceWe cryptanalyse here two variants of the McEliece cryptosystem based on quasi-...
In this paper we investigate the invariant property of PRINTcipher first discovered by Leander et al...
International audienceIn this paper we propose a new approach to investigate the security of the McE...
International audienceSuppose that the private key of discrete logarithm-based or factoring-based pu...
In this paper we investigate the invariant property of PRINTcipher first discovered by Leander et al...
International audienceA very popular trend in code-based cryptography is to decrease the public-key ...
Abstract. A very popular trend in code-based cryptography is to decrease the public-key size by focu...
In this paper we investigate the invariant property of PRINTcipher initially discovered by Leander e...
Abstract. In this paper, we present the cryptanalysis of a public key scheme based on a system of mu...
Abstract. A very popular trend in code-based cryptography is to decrease the public-key size by focu...
Abstract. Suppose that the private key of discrete logarithm-based or factoring-based public-key pri...