International audienceWe propose new algorithms for solving a class of large-weight syndrome decoding problems in random ternary codes. This is the main generic problem underlying the security of the recent Wave signature scheme (Debris-Alazard et al. 2019), and it has so far received limited attention. At SAC 2019 Bricout et al. proposed a reduction to a binary subset sum problem requiring many solutions, and used it to obtain the fastest known algorithm. However —as is often the case in the coding theory literature— its memory cost is proportional to its time cost, which makes it unattractive in most applications.In this work we propose a range of memory-efficient algorithms for this problem, which describe a near-continuous time-memory t...
Decoding of random linear block codes has been long exploited as a computationally hard problem on w...
There has been renewed interest in decoding Reed-Solomon (RS) codes without using syndromes recently...
Rank metric code-based cryptography exists for several years. The security of many cryptosystems is ...
International audienceWe propose new algorithms for solving a class of large-weight syndrome decodin...
International audienceThe Syndrome Decoding problem is at the core of many code-based cryptosys-tems...
The decoding of random linear codes is one of the most fundamental problems in both computational co...
We propose new time-memory trade-offs for the random subset sum problem defined on $(a_1,\ldots,a_n,...
International audienceThe security of code-based cryptography usually relies on the hardness of the ...
Abstract. The technique of Schroeppel and Shamir (SICOMP, 1981) has long been the most efficient way...
grantor: University of TorontoIn a 1996 paper, R. Impagliazzo and M. Naor show two average...
Fix positive integers B and w. Let C be a linear code over F_2 of length Bw. The 2-regular-decoding ...
Abstract. We explore time-memory and other tradeoffs for memory-hard functions, which are sup-posed ...
The syndrome decoding problem lies at the heart of code-based cryptographic constructions. Informati...
International audienceIn a recent article, Yi et al. proposed an algorithm for the decoding of binar...
The decoding problem is a fundamental problem in computational complexity theory. In particular, the...
Decoding of random linear block codes has been long exploited as a computationally hard problem on w...
There has been renewed interest in decoding Reed-Solomon (RS) codes without using syndromes recently...
Rank metric code-based cryptography exists for several years. The security of many cryptosystems is ...
International audienceWe propose new algorithms for solving a class of large-weight syndrome decodin...
International audienceThe Syndrome Decoding problem is at the core of many code-based cryptosys-tems...
The decoding of random linear codes is one of the most fundamental problems in both computational co...
We propose new time-memory trade-offs for the random subset sum problem defined on $(a_1,\ldots,a_n,...
International audienceThe security of code-based cryptography usually relies on the hardness of the ...
Abstract. The technique of Schroeppel and Shamir (SICOMP, 1981) has long been the most efficient way...
grantor: University of TorontoIn a 1996 paper, R. Impagliazzo and M. Naor show two average...
Fix positive integers B and w. Let C be a linear code over F_2 of length Bw. The 2-regular-decoding ...
Abstract. We explore time-memory and other tradeoffs for memory-hard functions, which are sup-posed ...
The syndrome decoding problem lies at the heart of code-based cryptographic constructions. Informati...
International audienceIn a recent article, Yi et al. proposed an algorithm for the decoding of binar...
The decoding problem is a fundamental problem in computational complexity theory. In particular, the...
Decoding of random linear block codes has been long exploited as a computationally hard problem on w...
There has been renewed interest in decoding Reed-Solomon (RS) codes without using syndromes recently...
Rank metric code-based cryptography exists for several years. The security of many cryptosystems is ...