MDPC-McEliece: New McEliece variants from moderate density parity-check codes
In this work, we propose two McEliece variants: one from Moderate Density Parity-Check
(MDPC) codes and another from quasi-cyclic MDPC codes. MDPC codes are LDPC codes …
(MDPC) codes and another from quasi-cyclic MDPC codes. MDPC codes are LDPC codes …
[KNJIGA][B] Concise encyclopedia of coding theory
Most coding theory experts date the origin of the subject with the 1948 publication of A
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
Reducing key length of the McEliece cryptosystem
The McEliece cryptosystem is one of the oldest public-key cryptosystems ever designed. It is
also the first public-key cryptosystem based on linear error-correcting codes. Its main …
also the first public-key cryptosystem based on linear error-correcting codes. Its main …
Algebraic cryptanalysis of McEliece variants with compact keys
In this paper we propose a new approach to investigate the security of the McEliece
cryptosystem. We recall that this cryptosystem relies on the use of error-correcting codes …
cryptosystem. We recall that this cryptosystem relies on the use of error-correcting codes …
Compact McEliece keys from Goppa codes
The classical McEliece cryptosystem is built upon the class of Goppa codes, which remains
secure to this date in contrast to many other families of codes but leads to very large public …
secure to this date in contrast to many other families of codes but leads to very large public …
A new analysis of the McEliece cryptosystem based on QC-LDPC codes
We improve our proposal of a new variant of the McEliece cryptosystem based on QC-LDPC
codes. The original McEliece cryptosystem, based on Goppa codes, is still unbroken up to …
codes. The original McEliece cryptosystem, based on Goppa codes, is still unbroken up to …
Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes
We cryptanalyse here two variants of the McEliece cryptosystem based on quasi-cyclic
codes. Both aim at reducing the key size by restricting the public and secret generator …
codes. Both aim at reducing the key size by restricting the public and secret generator …
Network coding-based post-quantum cryptography
We propose a novel hybrid universal network-coding cryptosystem (HUNCC) to obtain
secure post-quantum cryptography at high communication rates. The secure network-coding …
secure post-quantum cryptography at high communication rates. The secure network-coding …
Enhanced public key security for the McEliece cryptosystem
This paper studies a variant of the McEliece cryptosystem able to ensure that the code used
as the public key is no longer permutation equivalent to the secret code. This increases the …
as the public key is no longer permutation equivalent to the secret code. This increases the …
Lossy cryptography from code-based assumptions
Over the past few decades, we have seen a proliferation of advanced cryptographic
primitives with lossy or homomorphic properties built from various assumptions such as …
primitives with lossy or homomorphic properties built from various assumptions such as …