Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
9 years 11 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar
PQCRYPTO
2010
149views Cryptology» more  PQCRYPTO 2010»
10 years 3 months ago
Properties of the Discrete Differential with Cryptographic Applications
Abstract. Recently, the Csignature scheme has been completely broken by Dubois et al. [2, 3]. As a consequence, the security of SFLASH and other multivariate public key systems hav...
Daniel Smith-Tone
PQCRYPTO
2010
152views Cryptology» more  PQCRYPTO 2010»
10 years 5 months ago
Grover vs. McEliece
This paper shows that quantum information-set-decoding attacks are much faster than non-quantum information-set-decoding attacks.
Daniel J. Bernstein
PQCRYPTO
2010
156views Cryptology» more  PQCRYPTO 2010»
10 years 5 months ago
Selecting Parameters for the Rainbow Signature Scheme
Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security of communication in a post-quantum world. One of the most promising candidate...
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buc...
PQCRYPTO
2010
250views Cryptology» more  PQCRYPTO 2010»
10 years 5 months ago
Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
Abstract. We propose a variant of the “bonsai tree” signature scheme, a latticebased existentially unforgeable signature scheme in the standard model. Our construction offers ...
Markus Rückert
PQCRYPTO
2010
149views Cryptology» more  PQCRYPTO 2010»
10 years 5 months ago
Proposal of a Signature Scheme Based on STS Trapdoor
A New digital signature scheme based on Stepwise Triangular Scheme (STS) is proposed. The proposed trapdoor has resolved the vulnerability of STS and secure against both Gr¨obner ...
Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, ...
PQCRYPTO
2010
142views Cryptology» more  PQCRYPTO 2010»
10 years 5 months ago
Growth of the Ideal Generated by a Quadratic Boolean Function
We give exact formulas for the growth of the ideal Aλ for λ a quadratic element of the algebra of Boolean functions over the Galois field GF(2). That is, we calculate dim Akλ w...
Jintai Ding, Timothy J. Hodges, Victoria Kruglov
PQCRYPTO
2010
298views Cryptology» more  PQCRYPTO 2010»
10 years 5 months ago
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
Abstract. In this paper a new structural attack on the McEliece/Niederreiter public key cryptosystem based on subcodes of generalized ReedSolomon codes proposed by Berger and Loidr...
Christian Wieschebrink
PQCRYPTO
2010
187views Cryptology» more  PQCRYPTO 2010»
10 years 5 months ago
Information-Set Decoding for Linear Codes over Fq
The best known non-structural attacks against code-based cryptosystems are based on information-set decoding. Stern’s algorithm and its improvements are well optimized and the co...
Christiane Peters
books