We give a polynomial time attack on the McEliece public key cryptosystem based on algebraic geometry codes. Roughly speaking, this attacks runs in $O(n^4)$ operations in $\mathbb F_q$, where $n$ denotes the code length. Compared to previous attacks, allows to recover a decoding algorithm for the public key even for codes from high genus curves
International audienceWe give polynomial time attacks on the McEliece public key cryptosystem based ...
This paper addresses the question of retrieving the triple (X,P,E) from the algebraic geometry code ...
This thesis explores two different approaches to reduce the size of the public key cryptosystems bas...
We give a polynomial time attack on the McEliece public key cryptosystem based on algebraic geometry...
We give a polynomial time attack on the McEliece public key cryptosystem based on algebraic geometry...
We give a polynomial time attack on the McEliece public key cryptosystem based on subcodes of algebr...
We give polynomial time attacks on the McEliece public key cryptosystem-based either on algebraic ge...
International audienceWe give polynomial time attacks on the McEliece public key cryptosystem based ...
This paper addresses the question of retrieving the triple (X,P,E) from the algebraic geometry code ...
This thesis explores two different approaches to reduce the size of the public key cryptosystems bas...
We give a polynomial time attack on the McEliece public key cryptosystem based on algebraic geometry...
We give a polynomial time attack on the McEliece public key cryptosystem based on algebraic geometry...
We give a polynomial time attack on the McEliece public key cryptosystem based on subcodes of algebr...
We give polynomial time attacks on the McEliece public key cryptosystem-based either on algebraic ge...
International audienceWe give polynomial time attacks on the McEliece public key cryptosystem based ...
This paper addresses the question of retrieving the triple (X,P,E) from the algebraic geometry code ...
This thesis explores two different approaches to reduce the size of the public key cryptosystems bas...