International audiencePolar codes discovered by Arikan form a very powerful family of codes attaining many information theoretic limits in the fields of error correction and source coding. They have in particular much better decoding capabilities than Goppa codes which places them as a serious alternative in the design of both a public-key encryption scheme à la McEliece and a very efficient signature scheme. Shrestha and Kim proposed in 2014 to use them in order to come up with a new code-based public key cryptosystem. We present a key-recovery attack that makes it possible to recover a description of the permuted polar code providing all the information required for decrypting any message
This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the p...
A large part in the design of secure cryptographic primitives consists in identifying hard algorithm...
A large part in the design of secure cryptographic primitives consists in identifying hard algorithm...
International audiencePolar codes discovered by Arikan form a very powerful family of codes attainin...
International audiencePolar codes discovered by Arikan form a very powerful family of codes attainin...
McEliece's encryption scheme represents one of the solutions to the security issues that are raised ...
McEliece's encryption scheme represents one of the solutions to the security issues that are raised ...
First of all, during my PhD I focused on the public key cryptography, more exactly on the code-based...
First of all, during my PhD I focused on the public key cryptography, more exactly on the code-based...
Abstract In this paper we give an overview of some of the cryptographic applications which were deri...
One main construct for code-based public key cryptosystems is the McEliece framework that hedges upo...
Considering the McEliece cryptosystem using quasi-cylcic MDPC (Moderate Density Parity Check matrix)...
Considering the McEliece cryptosystem using quasi-cylcic MDPC (Moderate Density Parity Check matrix)...
There exists a natural trade-off in public key encryption (PKE) schemes based on ring learning with ...
This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the p...
This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the p...
A large part in the design of secure cryptographic primitives consists in identifying hard algorithm...
A large part in the design of secure cryptographic primitives consists in identifying hard algorithm...
International audiencePolar codes discovered by Arikan form a very powerful family of codes attainin...
International audiencePolar codes discovered by Arikan form a very powerful family of codes attainin...
McEliece's encryption scheme represents one of the solutions to the security issues that are raised ...
McEliece's encryption scheme represents one of the solutions to the security issues that are raised ...
First of all, during my PhD I focused on the public key cryptography, more exactly on the code-based...
First of all, during my PhD I focused on the public key cryptography, more exactly on the code-based...
Abstract In this paper we give an overview of some of the cryptographic applications which were deri...
One main construct for code-based public key cryptosystems is the McEliece framework that hedges upo...
Considering the McEliece cryptosystem using quasi-cylcic MDPC (Moderate Density Parity Check matrix)...
Considering the McEliece cryptosystem using quasi-cylcic MDPC (Moderate Density Parity Check matrix)...
There exists a natural trade-off in public key encryption (PKE) schemes based on ring learning with ...
This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the p...
This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the p...
A large part in the design of secure cryptographic primitives consists in identifying hard algorithm...
A large part in the design of secure cryptographic primitives consists in identifying hard algorithm...