[BUCH][B] Mathematics of public key cryptography

SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …

Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding

A Becker, A Joux, A May, A Meurer - … on the Theory and Applications of …, 2012 - Springer
Decoding random linear codes is a well studied problem with many applications in
complexity theory and cryptography. The security of almost all coding and LPN/LWE-based …

Exact exponential algorithms

FV Fomin, P Kaski - Communications of the ACM, 2013 - dl.acm.org
Exact exponential algorithms Page 1 80 coMMunicATions of ThE AcM | MARCh 2013 | Vol. 56
| No. 3 review articles Exact Exponential Algorithms of non-parameterized instances of intractable …

On computing nearest neighbors with applications to decoding of binary linear codes

A May, I Ozerov - Annual International Conference on the Theory and …, 2015 - Springer
We propose a new decoding algorithm for random binary linear codes. The so-called
information set decoding algorithm of Prange (1962) achieves worst-case complexity 2 …

Decoding random linear codes in

A May, A Meurer, E Thomae - International Conference on the Theory and …, 2011 - Springer
Decoding random linear codes is a fundamental problem in complexity theory and lies at the
heart of almost all code-based cryptography. The best attacks on the most prominent code …

Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices

I Damgård, C Orlandi, A Takahashi, M Tibouchi - Journal of Cryptology, 2022 - Springer
Although they have been studied for a long time, distributed signature protocols have
garnered renewed interest in recent years in view of novel applications to topics like …

LadderLeak: Breaking ECDSA with less than one bit of nonce leakage

DF Aranha, FR Novaes, A Takahashi… - Proceedings of the …, 2020 - dl.acm.org
Although it is one of the most popular signature schemes today, ECDSA presents a number
of implementation pitfalls, in particular due to the very sensitive nature of the random value …

Equihash: Asymmetric proof-of-work based on the generalized birthday problem

A Biryukov, D Khovratovich - Ledger, 2017 - ledgerjournal.org
Proof-of-work is a central concept in modern cryptocurrencies and denial-ofservice
protection tools, but the requirement for fast verification so far has made it an easy prey for …

Breaking Grain-128 with dynamic cube attacks

I Dinur, A Shamir - Fast Software Encryption: 18th International Workshop …, 2011 - Springer
We present a new variant of cube attacks called a dynamic cube attack. Whereas standard
cube attacks [4] find the key by solving a system of linear equations in the key bits, the new …

Quantum information set decoding algorithms

G Kachigar, JP Tillich - International Workshop on Post-Quantum …, 2017 - Springer
The security of code-based cryptosystems such as the McEliece cryptosystem relies
primarily on the difficulty of decoding random linear codes. The best decoding algorithms …