Cryptography Reference
In-Depth Information
[16] Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Prob-
lems of Control and Information Theory 15, 159{166 (1986); Citations in this
document:x 1 ,x 4
[17] Patterson, N.J.: The algebraic decoding of Goppa codes. IEEE Transactions on
Information Theory 21, 203{207 (1975); Citations in this document:x 2
[18] Peters, C.: Information-set decoding for linear codes overF q . In: PQCrypto 2010
[22], pp. 81{94 (2010), http://eprint.iacr.org/2009/589 ; Citations in this doc-
ument:x 1 ,x 3 ,x 4 ,x 4 ,x 4 ,x 5
[19] RSA Laboratories: The RSA Factoring Challenge (1991), http://www.rsa.com/
rsalabs/node.asp?id=2092 ; Citations in this document:x 4
[20] Sendrier, N.: On the structure of a randomly permuted concatenated code. In:
EUROCODE 94 [9], pp. 169{173 (1994); Citations in this document:x 3 ,x 3
[21] Sendrier, N.: Finding the permutation between equivalent linear codes: the sup-
port splitting algorithm. IEEE Transactions on Information Theory 46, 1193{
1203 (2000), MR 2001e:94017, http://hal.inria.fr/docs/00/07/30/37/PDF/
RR-3637.pdf ; Citations in this document:x 1
[22] Sendrier, N. (ed.): Post-quantum cryptography, third international workshop,
PQCrypto, Darmstadt, Germany, May 25-28, 2010. Lecture Notes in Computer
Science, vol. 6061. Springer, Heidelberg (2010); See [ 18 ], [ 25 ]
[23] Stein, W. (ed.): Sage Mathematics Software (Version 4.4.3). The Sage Group
(2010), http://www.sagemath.org ; Citations in this document:x 4
[24] Sugiyama, Y., Kasahara, M., Hirasawa, S., Namekawa, T.: Further results on
Goppa codes and their applications to constructing ecient binary codes. IEEE
Transactions on Information Theory 22, 518{526 (1976); Citations in this docu-
ment:x 2
[25] Wieschebrink, C.: Cryptanalysis of the Niederreiter public key scheme based on
GRS subcodes. In: PQCrypto 2010 [22], pp. 61{72 (2010); Citations in this docu-
ment:x 3
[26] Wikipedia: RSA Factoring Challenge | Wikipedia, The Free Encyclopedia. ac-
cessed 01 July 2011 (2011), http://en.wikipedia.org/wiki/RSA_Factoring_
Challenge ; Citations in this document:x 4
[27] Yang, B.-Y. (ed.): Post-quantum cryptography, Fourth international workshop,
PQCrypto, Taipei, Taiwan, November 29-December 02, 2011. Lecture Notes in
Computer Science, vol. 7071. Springer, Heidelberg (2011); See [ 5 ]
 
 
Search WWH ::




Custom Search