A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes, Proceedings of the 6th international conference on Security and Cryptography for Networks, pp.246-262, 2008. ,
DOI : 10.1007/978-3-540-85855-3_17
Security and complexity of the McEliece cryptosystem based on QC-LDPC codes, 2012. ,
Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC Codes, 2007 IEEE International Symposium on Information Theory, pp.2591-2595, 2007. ,
DOI : 10.1109/ISIT.2007.4557609
On the usage of quasicyclic low-density parity-check codes in the McEliece cryptosystem, Proceedings of the First International Conference on Communication and Electronics (ICEE'06), pp.305-310, 2006. ,
Quasi-cyclic low-density parity-check codes in the McEliece cryptosystem, IEEE International Conference on Communications, pp.951-956, 2007. ,
Reducing Key Length of the McEliece Cryptosystem, Progress in Cryptology, pp.77-97, 2009. ,
DOI : 10.1007/BFb0019850
URL : https://hal.archives-ouvertes.fr/hal-01081727
Quasi-Dyadic CFS Signatures, The 6th China International Conference on Information Security and Cryptology, pp.336-349, 2010. ,
DOI : 10.1007/978-3-642-21518-6_23
URL : https://hal.archives-ouvertes.fr/hal-00870939
Decoding random binary linear codes in 2 n/20 : How 1+1=0 improves information set decoding, Advances in Cryptology BIBLIOGRAPHY volume 7237 of Lecture Notes in Computer Science, pp.520-536, 2012. ,
Monoidic Codes in Cryptography, In Post-Quantum Cryptography Lecture Notes in Computer Science, vol.21, issue.4, pp.179-199, 2002. ,
DOI : 10.1109/TIT.1975.1055449
URL : https://hal.archives-ouvertes.fr/hal-00870943
Attacking and Defending the McEliece Cryptosystem, Proceedings of the 2nd International Workshop on Post-Quantum Cryptography, pp.31-46, 2008. ,
DOI : 10.1007/0-387-34799-2_10
Smaller Decoding Exponents: Ball-Collision Decoding, Lecture Notes in Computer Science, vol.6841, issue.45, pp.743-760, 2011. ,
DOI : 10.1007/978-3-642-22792-9_42
URL : http://repository.tue.nl/714848
Decoding Square-Free Goppa Codes Over <formula formulatype="inline"> <tex Notation="TeX">$\BBF_{p}$</tex></formula>, IEEE Transactions on Information Theory, vol.59, issue.10, pp.6851-6858 ,
DOI : 10.1109/TIT.2013.2270272
On the inherent intractability of certain coding problems (corresp.) Information Theory, IEEE Transactions on, vol.24, issue.3 5, pp.384-386, 1978. ,
How to Achieve a McEliece-Based Digital Signature Scheme, Advances in Cryptology, pp.157-174, 2001. ,
DOI : 10.1007/3-540-45682-1_10
URL : https://hal.archives-ouvertes.fr/inria-00072511
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
A distinguisher for high rate McEliece cryptosystems, IEEE Information Theory Workshop, pp.282-286, 2007. ,
Parallel-CFS, Selected Areas in Cryptography, pp.161-172, 2010. ,
DOI : 10.1007/3-540-45708-9_19
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes, RSA Conference, Cryptographers' Track (CT-RSA 2008), pp.19-35, 2008. ,
DOI : 10.1007/978-3-540-79263-5_2
URL : https://hal.archives-ouvertes.fr/inria-00556689
Cryptanalysis of the mceliece cryptosystem over hyperelliptic curves, International Workshop on Algebraic and Combinatorial Coding Theory, pp.99-107, 2008. ,
Algebraic cryptanalysis of McEliece variants with compact keys, Advances in Cryptology, pp.279-298, 2010. ,
Algebraic cryptanalysis of mceliece variants with compact keys ? towards a complexity analysis, 2nd International Conference on Symbolic Computation and Cryptography, pp.45-55, 2010. ,
Security Bounds for the Design of Code-Based Cryptosystems, Advances in Cryptology, pp.88-105, 2009. ,
DOI : 10.1007/978-3-642-10366-7_6
Shorter keys for code based cryptography, International Workshop on Coding and Cryptography (WCC 2005), pp.81-91, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-00078726
Low-density parity-check codes, IEEE Transactions on Information Theory, vol.8, issue.1, 1963. ,
DOI : 10.1109/TIT.1962.1057683
Severely denting the Gabidulin version of the McEliece public key cryptosystem. Designs, Codes and Cryptography, pp.37-45, 1995. ,
The Security of the Gabidulin Public Key Cryptosystem, Advances in Cryptology, pp.212-223, 1996. ,
DOI : 10.1007/3-540-68339-9_19
Low rank parity check codes and their application to cryptography, International Workshop on Coding and Cryptography (WCC 2013), pp.168-180, 2002. ,
URL : https://hal.archives-ouvertes.fr/hal-00913719
Ideals over a Non-Commutative Ring and their Application in Cryptology, Advances in Cryptology (EUROCRYPT'91), pp.482-489 ,
DOI : 10.1007/3-540-46416-6_41
Simple matrix-theory proof of the discrete dyadic convolution theorem, Electronics Letters, vol.9, issue.10, pp.238-239, 1973. ,
DOI : 10.1049/el:19730172
Implementation of McEliece Based on Quasi-dyadic Goppa Codes for Embedded Devices, Lecture Notes in Computer Science, vol.26, issue.5, pp.143-162, 2001. ,
DOI : 10.1137/S0097539795293172
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices, Cryptographic Hardware and Embedded Systems, pp.273-292, 2013. ,
DOI : 10.1007/978-3-642-40349-1_16
On the inherent intractability of certain coding problems (corresp.), IEEE Transactions on Information Theory, vol.423, issue.63, pp.429-445, 1996. ,
Fundamentals of Error-Correcting Codes, 2003. ,
DOI : 10.1017/CBO9780511807077
Mceliece public key cryptosystems using algebraic-geometric codes. Designs, Codes and Cryptography, pp.293-307, 1996. ,
DOI : 10.1109/isit.1995.550471
Semantically Secure McEliece Public-Key Cryptosystems -Conversions for McEliece PKC -, Public Key Cryptography, pp.19-35, 1992. ,
DOI : 10.1007/3-540-44586-2_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.9666
Flexible quasi-dyadic code-based public-key encryption and signature. Cryptology ePrint Archive, Report, vol.635, issue.71, 2009. ,
An Observation on the Security of McEliece???s Public-Key Cryptosystem, Advances in Cryptology (EUROCRYPT'88), pp.275-280, 1988. ,
DOI : 10.1007/3-540-45961-8_25
On the equivalence of McEliece's and niederreiter's public-key cryptosystems, IEEE Transactions on Information Theory, vol.40, issue.1, pp.271-273, 1994. ,
Compact McEliece Keys from Goppa Codes, Selected Areas in Cryptography, pp.376-392, 2009. ,
DOI : 10.1007/978-3-642-05445-7_24
URL : https://hal.archives-ouvertes.fr/hal-00870932
Compact McEliece Keys from Goppa Codes, 2009. ,
DOI : 10.1007/978-3-642-05445-7_24
URL : https://hal.archives-ouvertes.fr/hal-00870932
A public-key cryptosystem based on algebraic coding theory, Deep Space Network Progress Report, vol.44, pp.114-116, 1978. ,
Secrecy, authentication and public key systems ? A certified digital signature, 1979. ,
Use of Elliptic Curves in Cryptography, Advances in cryptology (CRYPTO 85), pp.417-426, 1986. ,
DOI : 10.1007/3-540-39799-X_31
Decoding Random Linear Codes in $\tilde{\mathcal{O}}(2^{0.054n})$, Advances in Cryptology, pp.107-124, 2011. ,
DOI : 10.1007/978-3-642-25385-0_6
Near shannon limit performance of Low Density Parity Check codes, Electronics Letters, vol.321, issue.23, pp.1645-1646, 1996. ,
Using low density parity check codes in the McEliece cryptosystem, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060), 2000. ,
DOI : 10.1109/ISIT.2000.866513
The Theory of Error- Correcting Codes, Elsevier Science B. V, 1978. ,
Cryptanalysis of the Sidelnikov Cryptosystem, Advances in Cryptology, pp.347-360, 2007. ,
DOI : 10.1007/978-3-540-72540-4_20
MDPC-McEliece: New McEliece variants from Moderate Density Parity-Check codes, 2013 IEEE International Symposium on Information Theory, 2012. ,
DOI : 10.1109/ISIT.2013.6620590
URL : https://hal.archives-ouvertes.fr/hal-00870929
MDPC-McEliece: New McEliece variants from Moderate Density Parity-Check codes, 2013 IEEE International Symposium on Information Theory, pp.2069-2073, 2013. ,
DOI : 10.1109/ISIT.2013.6620590
URL : https://hal.archives-ouvertes.fr/hal-00870929
Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory, pp.159-166 ,
Be'ery. Moderate-density parity-check codes, 2009. ,
Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes, Mathematics in Computer Science, vol.1, issue.4, pp.129-140, 2010. ,
DOI : 10.1007/s11786-009-0015-8
URL : https://hal.archives-ouvertes.fr/hal-01083566
Compact McEliece keys based on quasi-dyadic Srivastava codes. Cryptology ePrint Archive, Report, vol.179, issue.1, 2011. ,
DOI : 10.1515/jmc-2011-0099
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6035
Information-set decoding for linear codes over F q, Third International Workshop on Post-Quantum Cryptography, pp.81-94, 2010. ,
Curves, Codes, and Cryptography, 2011. ,
The use of information sets in decoding cyclic codes, IEEE Transactions on Information Theory, vol.8, issue.5, pp.5-9, 1962. ,
DOI : 10.1109/TIT.1962.1057777
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
An Introduction to LDPC Codes, CRC Handbook for Coding and Signal Processing for Recording Systems, 2003. ,
DOI : 10.1201/9780203490310.ch36
On the complexity of decoding Goppa codes, IEEE Transactions on Information Theory, vol.233, issue.4 41, pp.515-516, 1977. ,
On the inversion of certain matrices Mathematical Tables and Other Aids to Computation, pp.73-77, 1959. ,
Encoding information into constant weight words, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., pp.435-438, 2005. ,
DOI : 10.1109/ISIT.2005.1523371
On the use of structured codes in code based cryptography, Coding Theory and Cryptography III, Contactforum Koninklijke Vlaamse Academie van België voor Wetenschaeppen en Kunsten, pp.59-68, 2001. ,
Decoding one out of many, Post-Quantum Cryptography, pp.51-67 ,
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, SIAM Journal on Computing, vol.26, issue.5, pp.1484-1509, 1997. ,
DOI : 10.1137/S0097539795293172
A public-key cryptosystem based on binary Reed-Muller codes, Discrete Mathematics and Applications, vol.4, issue.3, pp.191-207, 1994. ,
DOI : 10.1515/dma.1994.4.3.191
On insecurity of cryptosystems based on generalized Reed-Solomon codes, Discrete Mathematics and Applications, vol.2, issue.4, pp.57-63, 1992. ,
DOI : 10.1515/dma.1992.2.4.439
Expander codes, IEEE Transactions on Information Theory, vol.42, issue.6, pp.1710-1722, 1996. ,
DOI : 10.1109/18.556667
A method for finding codewords of small weight, Coding Theory and Applications, pp.106-113, 1989. ,
DOI : 10.1007/BFb0019850
A recursive approach to low complexity codes, IEEE Transactions on Information Theory, vol.27, issue.5, pp.533-547, 2006. ,
DOI : 10.1109/TIT.1981.1056404
On extending Goppa codes to cyclic codes (Corresp.), IEEE Transactions on Information Theory, vol.21, issue.6, pp.721-716, 1975. ,
DOI : 10.1109/TIT.1975.1055449
Practical key recovery attacks on two McEliece variants, Cryptology ePrint Archive Report, vol.509, 2009. ,
A Generalized Birthday Problem, Advances in Cryptology (CRYPTO'97), pp.288-303, 1992. ,
DOI : 10.1007/3-540-45708-9_19
Two NP-complete Problems in Coding Theory with an Application in Code Based Cryptography, 2006 IEEE International Symposium on Information Theory, pp.1733-1737, 2006. ,
DOI : 10.1109/ISIT.2006.261651
Dyadic matrices and their potential significance in cryptography, Advances in Cryptology (Auscrypt'90), pp.308-310, 1990. ,
On the design of linear transformations for substitution permutation encryption networks, Selected Areas in Cryptography (SAC'97), pp.40-48, 1997. ,