2012
DOI: 10.1007/978-3-642-34129-8_45
|View full text |Cite
|
Sign up to set email alerts
|

A New Version of McEliece PKC Based on Convolutional Codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
41
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(41 citation statements)
references
References 12 publications
0
41
0
Order By: Relevance
“…Several proposals which suggested to replace binary Goppa codes with alternative families did not meet a similar fate. They all focus on a specific class of codes equipped with a decoding algorithm: generalized Reed-Solomon codes (GRS for short) [Nie86] or large subcodes of them [BL05], Reed-Muller codes [Sid94], algebraic geometry codes [JM96], LDPC and MDPC codes [BBC08,MTSB13] or convolutional codes [LJ12,GSJB14]. Most of them were successfully cryptanalyzed [SS92, Wie10, MS07, FM08, OTD10, CGG + 14, LT13,CMCP14b,COTG15].…”
Section: Introductionmentioning
confidence: 99%
“…Several proposals which suggested to replace binary Goppa codes with alternative families did not meet a similar fate. They all focus on a specific class of codes equipped with a decoding algorithm: generalized Reed-Solomon codes (GRS for short) [Nie86] or large subcodes of them [BL05], Reed-Muller codes [Sid94], algebraic geometry codes [JM96], LDPC and MDPC codes [BBC08,MTSB13] or convolutional codes [LJ12,GSJB14]. Most of them were successfully cryptanalyzed [SS92, Wie10, MS07, FM08, OTD10, CGG + 14, LT13,CMCP14b,COTG15].…”
Section: Introductionmentioning
confidence: 99%
“…The proposal with convolutional codes made in [LJ12] falls into this thread of research. What makes this new scheme interesting is the fact that its secret generator matrix contains large parts which are generated completely at random and has no algebraic structure as in other schemes such as generalized Reed-Solomon codes, algebraic geometry codes, Goppa codes or Reed-Muller codes.…”
Section: Introductionmentioning
confidence: 99%
“…In [LJ12] two schemes are given. The first one simply considers as the secret key the generator matrix of a time varying tail-biting convolutional code.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations