Sciweavers

10 search results - page 1 / 2
» pqcrypto 2010
Sort
View
PQCRYPTO
2010
152views Cryptology» more  PQCRYPTO 2010»
13 years 8 months ago
Grover vs. McEliece
This paper shows that quantum information-set-decoding attacks are much faster than non-quantum information-set-decoding attacks.
Daniel J. Bernstein
PQCRYPTO
2010
142views Cryptology» more  PQCRYPTO 2010»
13 years 8 months ago
Growth of the Ideal Generated by a Quadratic Boolean Function
We give exact formulas for the growth of the ideal Aλ for λ a quadratic element of the algebra of Boolean functions over the Galois field GF(2). That is, we calculate dim Akλ w...
Jintai Ding, Timothy J. Hodges, Victoria Kruglov
PQCRYPTO
2010
298views Cryptology» more  PQCRYPTO 2010»
13 years 8 months ago
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
Abstract. In this paper a new structural attack on the McEliece/Niederreiter public key cryptosystem based on subcodes of generalized ReedSolomon codes proposed by Berger and Loidr...
Christian Wieschebrink
PQCRYPTO
2010
156views Cryptology» more  PQCRYPTO 2010»
13 years 8 months ago
Selecting Parameters for the Rainbow Signature Scheme
Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security of communication in a post-quantum world. One of the most promising candidate...
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buc...
PQCRYPTO
2010
149views Cryptology» more  PQCRYPTO 2010»
13 years 6 months ago
Properties of the Discrete Differential with Cryptographic Applications
Abstract. Recently, the Csignature scheme has been completely broken by Dubois et al. [2, 3]. As a consequence, the security of SFLASH and other multivariate public key systems hav...
Daniel Smith-Tone