Security-related comments regarding McEliece's public-key cryptosystem, IEEE Transactions on Information Theory, vol.35, issue.2, pp.454-455, 1989. ,
DOI : 10.1109/18.32140
A new efficient threshold ring signature scheme based on coding theory, Proceedings of the second international workshop on Post-quantum cryptography -PQCrypto, pp.1-16, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-00335230
Minimal vectors in linear codes, IEEE Transactions on Information Theory, vol.44, issue.5, pp.2010-2017, 1998. ,
DOI : 10.1109/18.705584
List-decoding of binary Goppa codes up to the binary Johnson bound, 2011 IEEE Information Theory Workshop, pp.229-233, 2011. ,
DOI : 10.1109/ITW.2011.6089384
URL : https://hal.archives-ouvertes.fr/inria-00547106
Stphane Manuel, and Nicolas Sendrier. Sha-3 proposal: Fsb. Submission to NIST, 2008. ,
A Family of Fast Syndrome Based Cryptographic Hash Functions, Mycrypt, pp.64-83, 2005. ,
DOI : 10.1007/11554868_6
URL : https://hal.archives-ouvertes.fr/inria-00070414
Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC Codes, 2007 IEEE International Symposium on Information Theory, pp.2591-2595, 2007. ,
DOI : 10.1109/ISIT.2007.4557609
Some new NP-complete coding problems, Probl. Peredachi Inf, vol.30, pp.23-28, 1994. ,
Quasi dyadic cfs signature scheme, In Inscrypt, Lecture Notes in Computer Science, 2010. ,
DOI : 10.1007/978-3-642-21518-6_23
URL : https://hal.inria.fr/hal-00870939/document
Decoding Random Binary Linear Codes in 2 n/20: How 1???+???1???=???0 Improves Information Set Decoding, Advances in Cryptology -EUROCRYPT 2012 -31st Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, volume 7237 of Lecture Notes in Computer Science, pp.520-536, 2012. ,
DOI : 10.1007/978-3-642-29011-4_31
Security Proofs for Identity-Based Identification and Signature Schemes, EUROCRYPT, pp.268-286, 2004. ,
DOI : 10.1007/978-3-540-24676-3_17
Reducing Key Length of the McEliece Cryptosystem, Progress in Cryptology, AFRICACRYPT 09, pp.77-97, 2009. ,
DOI : 10.1007/BFb0019850
URL : https://hal.archives-ouvertes.fr/hal-01081727
On the inherent intractability of certain coding problems (Corresp.), IEEE Transactions on Information Theory, vol.24, issue.3, pp.384-386, 1978. ,
DOI : 10.1109/TIT.1978.1055873
Really Fast Syndrome-Based Hashing, Progress in Cryptology, AFRICACRYPT 2011, pp.134-152, 2011. ,
DOI : 10.1007/3-540-45708-9_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.221.5092
Grover vs. mceliece, 2008. ,
List decoding for binary goppa codes, 2008. ,
Attacking and Defending the McEliece Cryptosystem, Proceedings of the 2nd International Workshop on Post-Quantum Cryptography, PQCrypto '08, pp.31-46, 2008. ,
DOI : 10.1007/0-387-34799-2_10
Smaller decoding exponents: Ball-collision decoding Advances in Cryptology -CRYPTO 2011 -31st Annual Cryptology Conference, Proceedings, volume 6841 of Lecture Notes in Computer Science, pp.743-760, 2011. ,
Smaller decoding exponents: Ball-collision decoding Advances in Cryptology -CRYPTO 2011 -31st Annual Cryptology Conference, Proceedings, volume 6841 of Lecture Notes in Computer Science, pp.743-760, 2011. ,
DOI : 10.1007/978-3-642-22792-9_42
URL : http://repository.tue.nl/714848
Wild McEliece, Selected Areas in Cryptography, pp.143-158, 2011. ,
DOI : 10.1109/18.21264
Fpga implementation of a recently published signature scheme, 2004. ,
URL : https://hal.archives-ouvertes.fr/inria-00077045
McEliece Cryptosystem Implementation: Theory and Practice, Post-Quantum Cryptography, pp.47-62, 2008. ,
DOI : 10.1109/4234.823536
Cryptanalysis: a survey of recent results, Proceedings of the IEEE, vol.76, issue.5, pp.501-540, 1992. ,
DOI : 10.1109/5.4443
Attaques de cryptosystèmescryptosystèmes`cryptosystèmesà mots de poids faible et construction de fonctions t-résilientes, 1996. ,
A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511, IEEE Transactions on Information Theory, vol.44, issue.1, pp.367-378, 1998. ,
DOI : 10.1109/18.651067
Cryptanalysis of the Original McEliece Cryptosystem, Advances in Cryptology -ASIACRYPT '98, pp.187-199, 1998. ,
DOI : 10.1007/3-540-49649-1_16
McEliece/Niederreiter PKC: Sensitivity to Fault Injection, 2010 5th International Conference on Future Information Technology, 2010. ,
DOI : 10.1109/FUTURETECH.2010.5482663
URL : https://hal.archives-ouvertes.fr/hal-00602197
An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes, International Workshop on the Arithmetic of Finite Fields, pp.45-63, 2012. ,
DOI : 10.1007/978-3-642-31662-3_4
URL : https://hal.archives-ouvertes.fr/hal-00686645
Identity-based identification and signature schemes using correcting codes, WCC 2007. INRIA, 2007. ,
A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem, In Selected Areas in Cryptography LNCS, vol.8, issue.1, pp.171-186, 2011. ,
DOI : 10.1007/s002000050053
Application de la méthode de décodage itérative d'omurà a la cryptanalyse du système de mc eliece, 1993. ,
How to Achieve a McEliece-Based Digital Signature Scheme, Advances in Cryptology -ASIACRYPT 2001, pp.157-174, 2001. ,
DOI : 10.1007/3-540-45682-1_10
URL : https://hal.archives-ouvertes.fr/inria-00072511
Some notes on steganography, 1998. ,
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme, Lecture Notes in Computer Science, vol.4945, pp.65-77, 2008. ,
DOI : 10.1007/978-3-540-88353-1_6
Provably Secure Code-Based Threshold Ring Signatures, Cryptography and Coding, pp.222-235, 2009. ,
DOI : 10.1007/978-3-642-10868-6_13
URL : https://hal.archives-ouvertes.fr/hal-01082399
A Design Principle for Hash Functions, Advances in Cryptology -CRYPTO '89, pp.416-427, 1990. ,
DOI : 10.1007/0-387-34805-0_39
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.22644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model, Topics in Cryptology CT-RSA 2009, pp.240-251 ,
DOI : 10.1109/18.850662
MicroEliece: McEliece for Embedded Devices, Cryptographic Hardware and Embedded Systems -CHES 2009, pp.49-64, 2009. ,
DOI : 10.1007/978-3-642-04138-9_4
Extended Security Arguments for Signature Schemes, Africacrypt 2012, pp.19-34, 2012. ,
DOI : 10.1007/978-3-642-31410-0_2
A distinguisher for high rate mceliece cryptosystems, p.331, 2010. ,
How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Advances in Cryptology -CRYPTO '86, pp.186-194, 1987. ,
DOI : 10.1007/3-540-47721-7_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.8796
Nouvelles constructions utilisant des codes correcteurs d'erreurs en cryptographiècryptographiè a clé publique, 2004. ,
Parallel-CFS, Proceedings of the 17th international conference on Selected areas in cryptography, SAC'10, pp.159-170, 2011. ,
DOI : 10.1007/3-540-45708-9_19
Improved fast syndrome based cryptographic hash function, ECRYPT Hash Workshop, 2007. ,
Security Bounds for the Design of Code-Based Cryptosystems, Advances in Cryptology ASIACRYPT 2009, pp.88-105, 2009. ,
DOI : 10.1007/978-3-642-10366-7_6
An Efficient Pseudo-Random Generator Provably as Secure as Syndrome Decoding, Advances in Cryptology -EUROCRYPT '96, pp.245-255, 1996. ,
DOI : 10.1007/3-540-68339-9_22
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.8163
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes, Topics in Cryptology -CT RSA, pp.19-35, 2008. ,
DOI : 10.1007/978-3-540-79263-5_2
URL : https://hal.archives-ouvertes.fr/inria-00556689
Asymptotic Behavior of the ZZW Embedding Construction, IEEE Transactions on Information Forensics and Security, vol.4, issue.1, pp.151-153, 2009. ,
DOI : 10.1109/TIFS.2008.2011082
Writing on wet paper, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3923-3935, 2005. ,
DOI : 10.1109/TSP.2005.855393
Steganography in Digital Media: Principles, Algorithms, and Applications, 2009. ,
DOI : 10.1017/CBO9781139192903
Shorter keys for code based cryptography, Proceeedings of WCC'05, pp.81-90, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-00078726
Lightweight code-based identification and signature, 2007 IEEE International Symposium on Information Theory, 2007. ,
DOI : 10.1109/ISIT.2007.4557225
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.3620
SYND: a Fast Code-Based Stream Cipher with a Security Reduction, 2007 IEEE International Symposium on Information Theory, 2007. ,
DOI : 10.1109/ISIT.2007.4557224
Asymptotic improvement of the gilbert-varshamov bound for linear codes, Proceeedings of ISIT'06, pp.287-291, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-00181471
Computers and Intractability, A Guide to the Theory of NP-Completeness, 1979. ,
Practical key recovery attacks on two mceliece variants. IACR Eprint archive, 2009. ,
Equivalent Goppa Codes and Trapdoors to McEliece???s Public Key Cryptosystem, Advances in Cryptology -EUROCRYPT '91, pp.517-521, 1991. ,
DOI : 10.1007/3-540-46416-6_46
A (non-practical) three-pass identification protocol using coding theory, Advances in Cryptology, Auscrypt'90, pp.265-272, 1990. ,
DOI : 10.1007/BFb0030367
On the length of cryptographic hash-values used in identification schemes, Advances in Cryptology -CRYPTO '94, pp.202-215, 1994. ,
DOI : 10.1007/3-540-48658-5_21
The Knowledge Complexity of Interactive Proof Systems, SIAM Journal on Computing, vol.18, issue.1, pp.186-208, 1989. ,
DOI : 10.1137/0218012
A new class of linear error correcting codes, Probl. Pered. Inform, pp.24-30, 1970. ,
A fast quantum mechanical algorithm for database search, Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, STOC '96, pp.212-219, 1996. ,
Quantum mechanics helps in searching for a needle in a haystack, Phys. Rev. Lett, vol.79, issue.2, pp.325-328, 1997. ,
A new authentication algorithm, Coding Theory and Applications, pp.91-105, 1988. ,
DOI : 10.1007/BFb0019849
Practical Power Analysis Attacks on Software Implementations of McEliece, Lecture Notes in Computer Science, vol.6061, pp.108-125, 2010. ,
DOI : 10.1007/978-3-642-12929-2_9
Using advanced encryption standard (aes) counter mode with ipsec encapsulating security payload (esp), RFC Network Working Group, vol.3686, 2004. ,
DOI : 10.17487/rfc3686
Minimal codewords and secret sharing, 6th Joint Swedish-Russian Workshop on Information Theory, pp.276-279, 1993. ,
On the complexity of some cryptographic problems based on the general decoding problem, IEEE Transactions on Information Theory, vol.48, issue.10, pp.2669-2678, 2002. ,
DOI : 10.1109/TIT.2002.802608
An Observation on the Security of McEliece???s Public-Key Cryptosystem, Advances in Cryptology -EUROCRYPT '88, pp.275-280, 1988. ,
DOI : 10.1007/3-540-45961-8_25
A probabilistic algorithm for computing minimum weights of large error-correcting codes, IEEE Transactions on Information Theory, vol.34, issue.5, pp.1354-1359, 1988. ,
DOI : 10.1109/18.21270
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems, IEEE Transactions on Information Theory, vol.40, issue.1, p.271, 1994. ,
DOI : 10.1109/18.272496
Weak keys in the McEliece public-key cryptosystem, IEEE Transactions on Information Theory, vol.47, issue.3, pp.1207-1211, 2001. ,
DOI : 10.1109/18.915687
The Theory of Error-Correcting Code, 1977. ,
Decoding random linear codes in o ,
A public-key cryptosystem based on algebraic coding theory, JPL DSN Progress Report, pp.114-116, 1978. ,
On sharing secrets and Reed-Solomon codes, Communications of the ACM, vol.24, issue.9, pp.583-584, 1981. ,
DOI : 10.1145/358746.358762
Hiding information and signatures in trapdoor knapsacks, IEEE Transactions on Information Theory, vol.24, issue.5, pp.525-530, 1978. ,
DOI : 10.1109/TIT.1978.1055927
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.133.3059
Compact McEliece Keys from Goppa Codes, Selected Areas in Cryptography, pp.376-392, 2009. ,
DOI : 10.1007/978-3-642-05445-7_24
URL : https://hal.archives-ouvertes.fr/hal-00870932
A simple power analysis attack on a McEliece cryptoprocessor, Journal of Cryptographic Engineering, vol.26, issue.5, pp.29-36, 2011. ,
DOI : 10.1007/s13389-011-0001-3
Wet paper codes and the dual distance in steganography, Advances in Mathematics of Communications, vol.6, issue.3, pp.237-285, 2012. ,
DOI : 10.3934/amc.2012.6.273
URL : https://hal.archives-ouvertes.fr/inria-00584877
Steganography from a coding theory point of view, volume 8 of Series on Coding Theory and Cryptology, 2013. ,
Knapsack-type cryptosystems and algebraic coding theory, Problems Control Inform. Theory, vol.15, issue.2, pp.159-166, 1986. ,
Semantic security for the mceliece cryptosystem without random oracles. Designs, Codes and Cryptography, pp.289-305, 1007. ,
Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes, Mathematics in Computer Science, vol.1, issue.4, pp.129-140, 2010. ,
DOI : 10.1007/s11786-009-0015-8
URL : https://hal.archives-ouvertes.fr/hal-01083566
Information-Set Decoding for Linear Codes over F q, Proceedings Lecture Notes in Computer Science, vol.6061, pp.81-94, 2010. ,
DOI : 10.1007/978-3-642-12929-2_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.182.8991
The use of information sets in decoding cyclic codes, IEEE Transactions on Information Theory, vol.8, issue.5, pp.85-89, 1962. ,
DOI : 10.1109/TIT.1962.1057777
How to Explain Zero-Knowledge Protocols to Your Children, Advances in Cryptology-Crypto '89, pp.628-631, 1990. ,
DOI : 10.1007/0-387-34805-0_60
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.26, issue.1, pp.96-99, 1983. ,
DOI : 10.1145/357980.358017
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.5588
Linearization attacks against syndrome based hashes, Proceedings of the cryptology 8th international conference on Progress in cryptology, INDOCRYPT'07, pp.1-9, 2007. ,
Efficient generation of binary words of given weight, Cryptography and Coding - 5th IMA Conference, pp.184-187, 1995. ,
DOI : 10.1007/3-540-60693-9_20
On the structure of a randomly permuted concateneted code, EUROCODE '94, pp.169-173, 1994. ,
Finding the permutation between equivalent linear codes: the support splitting algorithm, IEEE Transactions on Information Theory, vol.46, issue.4, pp.1193-1203, 2000. ,
DOI : 10.1109/18.850662
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
Identity-Based Cryptosystems and Signature Schemes, CRYPTO'84, pp.47-53, 1984. ,
DOI : 10.1007/3-540-39568-7_5
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, Proceedings of the 35th Annual Symposium on Foundations of Computer Science, pp.20-22, 1994. ,
A Timing Attack against Patterson Algorithm in the McEliece PKC, Lecture Notes in Computer Science, vol.5984, pp.161-175, 2009. ,
DOI : 10.1007/978-3-642-14423-3_12
On insecurity of cryptosystems based on generalized Reed-Solomon codes, Discrete Mathematics and Applications, vol.2, issue.4, pp.57-63, 1992. ,
DOI : 10.1515/dma.1992.2.4.439
A method for finding codewords of small weight, Coding Theory and Applications, pp.106-113, 1988. ,
DOI : 10.1007/BFb0019850
A new identification scheme based on syndrome decoding, Advances in Cryptology -CRYPTO '93, pp.13-21, 1993. ,
DOI : 10.1007/3-540-48329-2_2
A Smart Card Implementation of the McEliece PKC, Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, pp.47-59, 2010. ,
DOI : 10.1007/978-3-540-88403-3_4
URL : https://hal.archives-ouvertes.fr/hal-01056067
Side Channels in the McEliece PKC, Post-Quantum Cryptography, pp.216-229, 2008. ,
DOI : 10.1007/978-3-540-46588-1_10
Further results on Goppa codes and their applications to constructing efficient binary codes, IEEE Transactions on Information Theory, vol.22, issue.5, pp.518-526, 1976. ,
DOI : 10.1109/TIT.1976.1055610
On the mceliece public-key cryptosystem In Advances in Cryptology -CRYPTO '88, Lecture Notes in Computer Science, vol.403, pp.119-131, 1988. ,
Cryptanalysis of Harari's identification scheme, Cryptography and Coding, pp.264-269, 1995. ,
DOI : 10.1007/3-540-60693-9_28
Improved identification schemes based on error-correcting codes, Applicable Algebra in Engineering, Communication and Computing, vol.9, issue.1, pp.57-69, 1996. ,
DOI : 10.1007/s002000050053
PUBLIC KEY CRYPTOGRAPHY AND CODING THEORY, Selected Topics in Information and Coding Theory, 2010. ,
DOI : 10.1142/9789812837172_0015
A Generalized Birthday Problem, Advances in Cryptology -CRYPTO '02, pp.288-304, 2002. ,
DOI : 10.1007/3-540-45708-9_19
F5???A Steganographic Algorithm, Information Hiding, pp.289-302, 2001. ,
DOI : 10.1007/3-540-45496-9_21