2014
DOI: 10.1007/978-3-319-02556-8
|View full text |Cite
|
Sign up to set email alerts
|

QC-LDPC Code-Based Cryptography

Abstract: The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
48
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 44 publications
(48 citation statements)
references
References 79 publications
0
48
0
Order By: Relevance
“…On the other hand, four attacks that have been reported for the McEliece cryptosystem in the past twenty six years [3]. When boundaries are computed for small fields there is a small difference, which could indicate four different attacks, but when the simulation are for larger values of the fields such as those required in this paper, the asymptote is the same for the four attacks.…”
Section: Corollary 1 For Mceliece-hermitian Code the Minimum Distancementioning
confidence: 90%
See 4 more Smart Citations
“…On the other hand, four attacks that have been reported for the McEliece cryptosystem in the past twenty six years [3]. When boundaries are computed for small fields there is a small difference, which could indicate four different attacks, but when the simulation are for larger values of the fields such as those required in this paper, the asymptote is the same for the four attacks.…”
Section: Corollary 1 For Mceliece-hermitian Code the Minimum Distancementioning
confidence: 90%
“…The McEliece cryptosystem attacks reported by [3] only consider Goppa codes constructed over the Galois fields G F (2 ω ), whereas we propose to use McEliece cryptosystem and Hermitian codes, that is, construct the generator matrix of the code using rational points on a Hermitian curve H e C over G F((2 q ) 2 ), as shown in Sect. 3.…”
Section: Corollary 1 For Mceliece-hermitian Code the Minimum Distancementioning
confidence: 98%
See 3 more Smart Citations