Dual attacks aiming at decoding generic linear codes have been found recently to outperform for certain parameters information set decoding techniques which have been for $60$ years the dominant tool for solving this problem and choosing the parameters of code-based cryptosystems. However, the analysis of the complexity of these dual attacks relies on some unproven assumptions that are not even fully backed up with experimental evidence. These dual attacks can actually be viewed as the code-based analogue of dual attacks in lattice based cryptography. Here too, dual attacks have been found out those past years to be strong competitors to primal attacks and a controversy has emerged whether similar heuristics made for instance on the indepe...
We recall why linear codes with complementary duals (LCD codes) play a role in counter-measures to p...
International audienceThe security of code-based cryptography relies primarily on the hardness of ge...
International audienceThe security of code-based cryptography relies primarily on the hardness of ge...
International audienceDual attacks aiming at decoding generic linear codes have been found recently ...
The security of code-based cryptography relies primarily on the hardness of decoding generic linear ...
The security of code-based cryptography relies primarily on the hardness of decoding generic linear ...
Learning with Errors (LWE) is an important problem for post-quantum cryptography (PQC) that underlin...
Cryptosystems based on the learning with errors (LWE) problem are assigned a security level that rel...
Cryptosystems based on the learning with errors (LWE) problem are assigned a security level that rel...
The dual attack has long been considered a relevant attack on lattice-based cryptographic schemes re...
International audienceThe security of code-based cryptography relies primarily on the hardness of ge...
Several generalizations of linear cryptanalysis have been proposed in the past, as well as very simi...
Many of the leading post-quantum key exchange and signature schemes rely on the conjectured hardness...
Many of the leading post-quantum key exchange and signature schemes rely on the conjectured hardness...
Several well-known public key encryption schemes, including those of Alekhnovich (FOCS 2003), Regev ...
We recall why linear codes with complementary duals (LCD codes) play a role in counter-measures to p...
International audienceThe security of code-based cryptography relies primarily on the hardness of ge...
International audienceThe security of code-based cryptography relies primarily on the hardness of ge...
International audienceDual attacks aiming at decoding generic linear codes have been found recently ...
The security of code-based cryptography relies primarily on the hardness of decoding generic linear ...
The security of code-based cryptography relies primarily on the hardness of decoding generic linear ...
Learning with Errors (LWE) is an important problem for post-quantum cryptography (PQC) that underlin...
Cryptosystems based on the learning with errors (LWE) problem are assigned a security level that rel...
Cryptosystems based on the learning with errors (LWE) problem are assigned a security level that rel...
The dual attack has long been considered a relevant attack on lattice-based cryptographic schemes re...
International audienceThe security of code-based cryptography relies primarily on the hardness of ge...
Several generalizations of linear cryptanalysis have been proposed in the past, as well as very simi...
Many of the leading post-quantum key exchange and signature schemes rely on the conjectured hardness...
Many of the leading post-quantum key exchange and signature schemes rely on the conjectured hardness...
Several well-known public key encryption schemes, including those of Alekhnovich (FOCS 2003), Regev ...
We recall why linear codes with complementary duals (LCD codes) play a role in counter-measures to p...
International audienceThe security of code-based cryptography relies primarily on the hardness of ge...
International audienceThe security of code-based cryptography relies primarily on the hardness of ge...