A distinguisher for high-rate McEliece cryptosystems

JC Faugere, V Gauthier-Umana… - IEEE Transactions …, 2013 - ieeexplore.ieee.org
The Goppa Code Distinguishing (GD) problem consists in distinguishing the matrix of a
Goppa code from a random matrix. The hardness of this problem is an assumption to prove …

Strongly secure authenticated key exchange from factoring, codes, and lattices

A Fujioka, K Suzuki, K Xagawa… - Designs, Codes and …, 2015 - Springer
An unresolved problem in research on authenticated key exchange (AKE) in the public-key
setting is to construct a secure protocol against advanced attacks such as key compromise …

Enhanced public key security for the McEliece cryptosystem

M Baldi, M Bianchi, F Chiaraluce, J Rosenthal… - Journal of …, 2016 - Springer
This paper studies a variant of the McEliece cryptosystem able to ensure that the code used
as the public key is no longer permutation equivalent to the secret code. This increases the …

Chosen-ciphertext security via correlated products

A Rosen, G Segev - Theory of Cryptography: 6th Theory of Cryptography …, 2009 - Springer
We initiate the study of one-wayness under correlated products. We are interested in
identifying necessary and sufficient conditions for a function f and a distribution on inputs (x …

More constructions of lossy and correlation-secure trapdoor functions

DM Freeman, O Goldreich, E Kiltz, A Rosen… - Public Key Cryptography …, 2010 - Springer
We propose new and improved instantiations of lossy trapdoor functions (Peikert and
Waters, STOC'08), and correlation-secure trapdoor functions (Rosen and Segev, TCC'09) …

IND-CCA secure cryptography based on a variant of the LPN problem

N Döttling, J Müller-Quade… - … Conference on the Theory …, 2012 - Springer
Abstract In 2003 Michael Alekhnovich (FOCS 2003) introduced a novel variant of the
learning parity with noise problem and showed that it implies IND-CPA secure public-key …

A framework for efficient adaptively secure composable oblivious transfer in the ROM

PSLM Barreto, B David, R Dowsley, K Morozov… - arxiv preprint arxiv …, 2017 - arxiv.org
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of
applications, in particular, as an essential building block for two-party and multi-party …

Coding-based hybrid post-quantum cryptosystem for non-uniform information

S Tarnopolsky, A Cohen - 2024 IEEE International Symposium …, 2024 - ieeexplore.ieee.org
We introduce for non-uniform messages a novel hybrid universal network coding
cryptosystem (NU-HUNCC) in the finite blocklength regime that provides Post-Quantum (PQ) …

[PDF][PDF] Challenges and opportunities of cloud computing

M Hauck, M Huber, M Klems, S Kounev… - Karlsruhe Reports in …, 2010 - Citeseer
In recent years, Cloud Computing has become an emerging technology that gains wide
influence on IT systems. Cloud Computing is a distributed computing model for enabling …

Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism

A Fujioka, K Suzuki, K Xagawa… - Proceedings of the 8th …, 2013 - dl.acm.org
This paper discusses how to realize practical post-quantum authenticated key exchange
(AKE) with strong security, ie, CK+ security (Krawczyk, CRYPTO 2005). It is known that …