References
- Al Jabri A. Kh. "A statistical Decoding Algorithm for General Linear Blockl Codes," IMA Int. Conf., volume 2260 of Lecture Notes in Computer Science, Springer (2001), pp. 1-8.
- Avanzi R., Hoerder S., Page D., and Tunstall M. "Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems," Journal of Cryptographic Engineering 1(4) (2011), pp. 271-281. https://doi.org/10.1007/s13389-011-0024-9
- Berger T. P., Cayrel P., Gaborit P., and Otmani A. "Reducing Key Length of the McEliece Cryptosystem," AFRICACRYPT, volume 5580 of Lecture Notes in Computer Science, Springer (2009), pp. 77-97.
- Bernstein D. J., Lange T., and Peters C. "Attacking and defending the McEliece cryptosystem," PQCrypto, volume 5299 of Lecture Notes in Computer Science, Springer (2008), pp. 31-46.
- Bernstein D. J. "Grover vs McEliece," PQCrypto, volume 6061 of Lecture Notes in Computer Science, Springer (2010), pp. 73-80.
- Bernstein D. J., Lange T., and Peters C. "Wild McEliece," Selected Areas in Cryptography, volume 6544 of Lecture Notes in Computer Science, Springer (2010), pp. 143-158.
- Bernstein D. J., Lange T., and Peters C. "Wild McEliece Incognito," PQCrypto, volume 7071 of Lecture Notes in Computer Science, Springer (2011), pp. 244-254.
- Bernstein D. J., Lange T., and Peters C. "Smaller decoding exponents: ball-collision decoding," CRYPTO, LNCS vol 6841 (2011), pp.743-760.
- Berson T. A. "Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack," CRYPTO, volume 1294 of Lecture Notes in Computer Science, Springer (1997), pp. 213-220.
- Brickell E. F., and Odlyzko A. M. "Cryptanalysis: A survey of recent results," Proc. of IEEE '88, vol. 75, pp578-593.
- Canteaut A., and Chabaud F. "A new algorithm for Finding Minimum-Weight Words in a Linear Code: Application to McEliece's Cryptosystem and to narrow-sense BCH codes of length 511," IEEE Transactions on Information Theory, 44(1) (1998), pp. 367-378. https://doi.org/10.1109/18.651067
- Courtois N., Finiasz M., and Sendrier N. "How to achieve a McEliece-based Digital Signature Scheme", ASIACRYPT, volume 2248 of Lecture Notes in Computer Science, Springer (2001), pp. 157-174.
- Engelbert D., Overbeck R., and Schmidt A. "A Summary of McEliece-Type Cryptosystems and their Security," Journal of Mathematical Cryptology 1(2) (2007), pp. 151-199. https://doi.org/10.1515/JMC.2007.009
- Faugere J., Otmani A., Perret L., Portzamparc F., and Tillich J. "Structural Cryptanalysis of McEliece Schemes with Compact Keys," Cryptology ePrint Archive, (2014), Report 2014/210.(http://eprint.iacr.org/).
- Faure C., and Minder L. "Cryptanalysis of the McEliece cryptosystem over hyperelliptic curves," Proceedings of the eleventh International Workshop on Algebraic and Combinatorial Coding Theory (2008), pp. 99-107.
- Finiasz M., and Sendrier N. "Digital Signature Scheme Based on McEliece," Encyclopedia of Cryptography and Security (2011), pp. 342-343.
- Fujisaki E., and Okamoto T. "Secure Integration of Asymmetric and Symmetric Encryption Schemes," CRYPTO, volume 1666 of Lecture Notes in Computer Science, Springer (1999), pp. 537-554.
- Fujita H. "Quantum McEliece public-key cryptosystem," Quantum Information & Computation 12(3-4) (2012), pp. 181-202.
- Goborit P. "Shorter keys for code based cryptography," Proceedings of WCC 2005 (2005), pp. 81-91.
- Howgrave-Graham N., and Joux A. "New Generic Algorithms for Hard Knapsacks," EUROCRYPT, volume 6110 of Lecture Notes in Computer Science, Springer (2010), pp. 235-256.
- Kobara K., and Imai H. "Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC," Public Key Cryptography, volume 1992 of Lecture Notes in Computer Science, Springer (2001), pp. 19-35.
- Kobara K., and Imai H. "On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC," IEEE Transactions on Information Theory 49(12) (2003), pp. 3160-3168. https://doi.org/10.1109/TIT.2003.820016
- Lee P. J., and Brickell E. F. "An Observation on the security of McEliece's Public-Key Cryptosystem," EUROCRYPT, Lec Notes in CS (1988), pp. 275-280.
- Li Y., Deng R. H., and Wang X. "On the equivalence of McEliece's and Niederreiter's public-key cryptosystems," IEEE Transactions on Information Theory 40(1) (1994) pp. 271-273. https://doi.org/10.1109/18.272496
- Loidreau P. "Strengthening McEliece cryptosystem," ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, Springer (2000), pp. 585-598.
- May A., Meurer A., and Thomae E. "Decoding Random Linear Codes in O(20.054n)," ASIACRYPT, volume 7073 of Lecture Notes in Computer Science, Springer (2011), pp. 107-124.
- McEliece R. J. "A Public Key Cryptosystem based on Algebraic Coding Theory," DSN progress report 42-44 (1978), pp. 114-116.
- Misoczki R., Tillich J., Sendrier N., and Barreto P. S. L. M. "MDPC-McEliece: New McEliece variants from Moderate Density Parity-Check codes," Proceedings of the 2013 IEEE International Symposium on Information Theory, IEEE (2013), pp. 2069-2073.
- Overbeck R., and Sendrier N. "Code-based cryptography," Post-Quantum Cryptography, Springer (2009), pp. 95-145.
- 박승안, "선형 부호," 부호이론, 京文社 (2005), pp. 207-306.
- Peters C. "Information-Set Decoding for Linear Codes over Fq," PQCrypto, volume 6061 of Lecture Notes in Computer Science, Springer (2010), pp. 81-94.
- Persichetti E. "Compact McEliece keys based on Quasi-Dyadic Srivastava codes," Journal of Mathematical Cryptology 6(2) (2012), pp. 149-169.
- Pless V. "Introduction to the Theory of Error-Correcting Codes," John Wiley & Sons (1998), pp.1-38.
- Pointcheval D. "Chosen-Ciphertext Security for Any One-Way Cryptosystem," Public Key Cryptography, volume 1751 of Lecture Notes in Computer Science, Springer (2000), pp. 129-146.
- Sendrier N. "On the security of the McEliece pk cryptosystem," M. Blaum, P. Farrel, and H. van Tilborg, editors, Proceedings of Workshop honoring Prof. Bob McEliece on his 60th birthday (2002), pp. 141-163.
- Shor P. W. "Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer," SIAM Journal on Computing 26(5) (1997), pp. 1484-1509. https://doi.org/10.1137/S0097539795293172
- Sidelnikov V.M., and Shestakov S.O. "On insecurity of cryptosystems based on generalized Reed-Solomon codes," Discrete Mathematics and Applications, 1(4) (1992), pp. 439-444.
- Stern J. "A method for finding codewords of small weight," Proceedings of Coding Theory and Applications (1989), pp. 106-113.
- Strenzke F. "Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems," Post-Quantum Cryptography, LNCS vol 7932 (2013), pp. 217-230.
- Sugiyama Y., Kasahara M., Hirasawa S., and Namekawa T. "aFurther results on Goppa codes and their applications to constructing efficient binary codes," IEEE Transactions on Information Theory 22(5) (1976), pp. 518-526. https://doi.org/10.1109/TIT.1976.1055610
- Zajac P. "A note on CCA2-protected McEliece cryptosystem with a systematic public key," Cryptology ePrint Archive, (2014), Report 2014/651.(http://eprint.iacr.org/).