McEliece Cryptosystem Implementation: Theory and Practice

作者: Bhaskar Biswas , Nicolas Sendrier

DOI: 10.1007/978-3-540-88403-3_4

关键词:

摘要: Though it is old and considered fast, the implementation of McEliece public-key encryption scheme has never been thoroughly studied. We consider that problem here we provide an with a complete description our algorithmic choices parameters selection, together state art in cryptanalysis. This provides reference for measuring speed scalability this cryptosystem. Compared other, number-theory based, public key scheme, demonstrate gain factor at least 5 to 10.

参考文章(24)
Alexander Barg, Complexity Issues in Coding Theory Electronic Colloquium on Computational Complexity. ,vol. 4, ,(1997)
Mihir Bellare, Phillip Rogaway, Optimal asymmetric encryption theory and application of cryptographic techniques. pp. 92- 111 ,(1994) , 10.1007/BFB0053428
Richard A. Brualdi, Vera Pless, W. C. Huffman, Handbook Of Coding Theory ,(2011)
Kazukuni Kobara, Hideki Imai, Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC public key cryptography. pp. 19- 35 ,(2001) , 10.1007/3-540-44586-2_2
David Pointcheval, Chosen-Ciphertext Security for Any One-Way Cryptosystem public key cryptography. pp. 129- 146 ,(2000) , 10.1007/978-3-540-46588-1_10
Chris Hall, Ian Goldberg, Bruce Schneier, Reaction Attacks against several Public-Key Cryptosystems international conference on information and communication security. pp. 2- 12 ,(1999) , 10.1007/978-3-540-47942-0_2
Thomas A. Berson, Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack international cryptology conference. pp. 213- 220 ,(1997) , 10.1007/BFB0052237
E. R. Berlekamp, Factoring polynomials over large finite fields Mathematics of Computation. ,vol. 24, pp. 713- 735 ,(1970) , 10.1090/S0025-5718-1970-0276200-X
N. Sendrier, Encoding information into constant weight words international symposium on information theory. pp. 435- 438 ,(2005) , 10.1109/ISIT.2005.1523371