Very few public-key cryptosystems are known that can encrypt and decrypt in time $ b^{ 2¿+¿o(1) } $with conjectured security level $2^b$ against conventional computers and quantum computers. The oldest of these systems is the classic McEliece code-based cryptosystem. The best attacks known against this system are generic decoding attacks that treat McEliece’s hidden binary Goppa codes as random linear codes. A standard conjecture is that the best possible w-error-decoding attacks against random linear codes of dimension k and length n take time $ 2^{ (\alpha(R,W)¿+¿o(1))^n } $ if k/n¿¿¿R and w/n¿¿¿W as n¿¿¿8. Before this paper, the best upper bound known on the exponent a(R,W) was the exponent of an attack introduced by Stern in 1989. This ...
International audienceModerate Density Parity Check (MDPC) codes are defined here as codes which hav...
Decoding of random linear block codes has been long exploited as a computationally hard problem on w...
To speed up the RSA decryption one may try to use small secret decryption exponent d. However, in 19...
Very few public-key cryptosystems are known that can encrypt and decrypt in time $ b^{ 2¿+¿o(1) } $w...
This paper introduces a new generic decoding algorithm that is asymptotically faster than any previo...
Includes bibliographical references (page 38).This paper presents a new decoding algorithm named Var...
The decoding of random linear codes is one of the most fundamental problems in both computational co...
In this paper we generalize the ball-collision algorithm by Bernstein, Lange, Peters from the binary...
This paper shows that quantum information-set-decoding attacks are asymptotically much faster than n...
We propose a new algorithm for the decoding of random binary linear codes of dimension $n$ that is s...
A new probabilistic algorithm for decoding one received word from a set of many given received words...
In this paper we generalize the ball-collision algorithm by Bernstein, Lange, Peters from the binary...
The first cryptographic protocol based on error-correcting codes was proposed in 1978 by Robert McEl...
Abstract. Public key cryptographic algorithms are typically based on group exponentiation algorithms...
International audienceModerate Density Parity Check (MDPC) codes are defined here as codes which hav...
Decoding of random linear block codes has been long exploited as a computationally hard problem on w...
To speed up the RSA decryption one may try to use small secret decryption exponent d. However, in 19...
Very few public-key cryptosystems are known that can encrypt and decrypt in time $ b^{ 2¿+¿o(1) } $w...
This paper introduces a new generic decoding algorithm that is asymptotically faster than any previo...
Includes bibliographical references (page 38).This paper presents a new decoding algorithm named Var...
The decoding of random linear codes is one of the most fundamental problems in both computational co...
In this paper we generalize the ball-collision algorithm by Bernstein, Lange, Peters from the binary...
This paper shows that quantum information-set-decoding attacks are asymptotically much faster than n...
We propose a new algorithm for the decoding of random binary linear codes of dimension $n$ that is s...
A new probabilistic algorithm for decoding one received word from a set of many given received words...
In this paper we generalize the ball-collision algorithm by Bernstein, Lange, Peters from the binary...
The first cryptographic protocol based on error-correcting codes was proposed in 1978 by Robert McEl...
Abstract. Public key cryptographic algorithms are typically based on group exponentiation algorithms...
International audienceModerate Density Parity Check (MDPC) codes are defined here as codes which hav...
Decoding of random linear block codes has been long exploited as a computationally hard problem on w...
To speed up the RSA decryption one may try to use small secret decryption exponent d. However, in 19...