Abstract McEliece proposed the first public-key cryptosystem based on linear error-correcting codes. A code with an efficient bounded distance decoding algorithm is chosen as secret key. It is assumed that the chosen code looks like a random code. The known efficient bounded distance decoding algorithms of the families of codes proposed for code-based cryptography, like ReedSolomon codes, Goppa codes, alternant codes or algebraic geometry codes, can be described in terms of error-correcting pairs (ECP). That means that, the McEliece cryptosystem is not only based on the intractability of bounded distance decoding but also on the problem of retrieving an error-correcting pair from the public code. In this article we propose the class of code...
Error-correcting codes are used to reconstitute digital data, which are proned to alterations during...
This thesis studies some aspects of error-correcting codes and their applications to information sec...
Le premier protocole cryptographique basé sur les codes correcteurs d'erreurs a été proposé en 1978 ...
McEliece cryptosystem is the first public-key cryptosystem based on linear error-correcting codes. A...
International audienceMcEliece proposed the first public-key cryptosystem based on linear error-corr...
Code-based cryptography is an interesting alternative to classic number-theory PKC since it is conje...
Public-key cryptographic algorithms are an essential part of todays cyber security, since those are ...
Abstract In this paper we give an overview of some of the cryptographic applications which were deri...
The security of the most popular number-theory public key crypto (PKC) systems will be devastatingly...
Abstract. We present a new family of linear binary codes of length n and dimension k accompanied wit...
International audienceCode-based cryptography is an interesting alternative to classic number-theory...
In this paper, we seek to understand some basic principles of coding theory. Specifically, we define...
Breaking contemporary cryptographic algorithms using any binary computer has at least sub-exponentia...
The original McEliece cryptosystem uses length-$n$ codes over $\rm{F}_2$ with dimension $\geq n-mt$ ...
Error-correcting codes are used to reconstitute digital data, which are proned to alterations during...
This thesis studies some aspects of error-correcting codes and their applications to information sec...
Le premier protocole cryptographique basé sur les codes correcteurs d'erreurs a été proposé en 1978 ...
McEliece cryptosystem is the first public-key cryptosystem based on linear error-correcting codes. A...
International audienceMcEliece proposed the first public-key cryptosystem based on linear error-corr...
Code-based cryptography is an interesting alternative to classic number-theory PKC since it is conje...
Public-key cryptographic algorithms are an essential part of todays cyber security, since those are ...
Abstract In this paper we give an overview of some of the cryptographic applications which were deri...
The security of the most popular number-theory public key crypto (PKC) systems will be devastatingly...
Abstract. We present a new family of linear binary codes of length n and dimension k accompanied wit...
International audienceCode-based cryptography is an interesting alternative to classic number-theory...
In this paper, we seek to understand some basic principles of coding theory. Specifically, we define...
Breaking contemporary cryptographic algorithms using any binary computer has at least sub-exponentia...
The original McEliece cryptosystem uses length-$n$ codes over $\rm{F}_2$ with dimension $\geq n-mt$ ...
Error-correcting codes are used to reconstitute digital data, which are proned to alterations during...
This thesis studies some aspects of error-correcting codes and their applications to information sec...
Le premier protocole cryptographique basé sur les codes correcteurs d'erreurs a été proposé en 1978 ...