Publié sur ArxivBaldi et \textit{al.} proposed a variant of McEliece's cryptosystem. The main idea is to replace its permutation matrix by adding to it a rank 1 matrix. The motivation for this change is twofold: it would allow the use of codes that were shown to be insecure in the original McEliece's cryptosystem, and it would reduce the key size while keeping the same security against generic decoding attacks. The authors suggest to use generalized Reed-Solomon codes instead of Goppa codes. The public code built with this method is not anymore a generalized Reed-Solomon code. On the other hand, it contains a very large secret generalized Reed-Solomon code. In this paper we present an attack that is built upon a distinguisher which is able ...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
International audienceBogdanov and Lee suggested a homomorphic public-key encryption scheme based on...
Bogdanov and Lee suggested a homomorphic public-key encryption scheme based on error correcting co...
Publié sur ArxivBaldi et \textit{al.} proposed a variant of McEliece's cryptosystem. The main idea i...
Publié sur ArxivBaldi et \textit{al.} proposed a variant of McEliece's cryptosystem. The main idea i...
Abstract. The purpose of this paper is to demonstrate that a distinguisher of Reed-Solomon codes bas...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
Because of their interesting algebraic properties, several authors promote the use of generalized Re...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
International audienceBogdanov and Lee suggested a homomorphic public-key encryption scheme based on...
Bogdanov and Lee suggested a homomorphic public-key encryption scheme based on error correcting co...
Publié sur ArxivBaldi et \textit{al.} proposed a variant of McEliece's cryptosystem. The main idea i...
Publié sur ArxivBaldi et \textit{al.} proposed a variant of McEliece's cryptosystem. The main idea i...
Abstract. The purpose of this paper is to demonstrate that a distinguisher of Reed-Solomon codes bas...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
Because of their interesting algebraic properties, several authors promote the use of generalized Re...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
International audienceThe purpose of this paper is to demonstrate that a distinguisher of Reed-Solom...
International audienceBogdanov and Lee suggested a homomorphic public-key encryption scheme based on...
Bogdanov and Lee suggested a homomorphic public-key encryption scheme based on error correcting co...