Löndahl and Johansson proposed last year a variant of the McEliece cryptosystem which replaces Goppa codes by convolutional codes. This modification is supposed to make structural attacks more difficult since the public generator matrix of this scheme contains large parts which are generated completely at random. They proposed two schemes of this kind, one of them consists in taking a Goppa code and extending it by adding a generator matrix of a time varying convolutional code. We show here that this scheme can be successfully attacked by looking for low-weight codewords in the public code of this scheme and using it to unravel the convolutional part. It remains to break the Goppa part of this scheme which can be done in less than a day of ...
Code-based cryptography, introduced by Robert McEliece in 1978, is a potential candidate to replace ...
Abstract. The purpose of this paper is to study the difficulty of the so-called Goppa Code Distingui...
Today, cryptographic applications are used in nearly all areas of our lives, including the economy, ...
International audienceLöndahl and Johansson proposed last year a variant of the McEliece cryptosyste...
International audienceDifferent variants of the code-based McEliece cryptosystem were pro- posed to ...
A large part in the design of secure cryptographic primitives consists in identifying hard algorithm...
International audienceThe classical McEliece cryptosystem is built upon the class of Goppa codes, wh...
The first cryptographic protocol based on error-correcting codes was proposed in 1978 by Robert McEl...
The Goppa Code Distinguishing (GD) problem consists in distinguishing the matrix of Goppa code from ...
International audienceIn this paper, we detail two side-channel attacks against the McEliece public-...
Recently, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding...
International audienceIn this paper, we present a new algebraic attack against some special cases of...
International audienceCode-based Cryptography together with lattice-based cryptography, multivariate...
International audienceThe purpose of this talk is to study the difficulty of the Goppa Code Distingu...
The wild McEliece cryptosystem uses wild Goppa codes over finite fields to achieve smaller public ke...
Code-based cryptography, introduced by Robert McEliece in 1978, is a potential candidate to replace ...
Abstract. The purpose of this paper is to study the difficulty of the so-called Goppa Code Distingui...
Today, cryptographic applications are used in nearly all areas of our lives, including the economy, ...
International audienceLöndahl and Johansson proposed last year a variant of the McEliece cryptosyste...
International audienceDifferent variants of the code-based McEliece cryptosystem were pro- posed to ...
A large part in the design of secure cryptographic primitives consists in identifying hard algorithm...
International audienceThe classical McEliece cryptosystem is built upon the class of Goppa codes, wh...
The first cryptographic protocol based on error-correcting codes was proposed in 1978 by Robert McEl...
The Goppa Code Distinguishing (GD) problem consists in distinguishing the matrix of Goppa code from ...
International audienceIn this paper, we detail two side-channel attacks against the McEliece public-...
Recently, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding...
International audienceIn this paper, we present a new algebraic attack against some special cases of...
International audienceCode-based Cryptography together with lattice-based cryptography, multivariate...
International audienceThe purpose of this talk is to study the difficulty of the Goppa Code Distingu...
The wild McEliece cryptosystem uses wild Goppa codes over finite fields to achieve smaller public ke...
Code-based cryptography, introduced by Robert McEliece in 1978, is a potential candidate to replace ...
Abstract. The purpose of this paper is to study the difficulty of the so-called Goppa Code Distingui...
Today, cryptographic applications are used in nearly all areas of our lives, including the economy, ...