Tytuł artykułu
Autorzy
Identyfikatory
Warianty tytułu
Code based cryptography - a survey of encryption algorithms
Konferencja
XXXIII Krajowe Sympozjum Telekomunikacji i Teleinformatyki (XXXIII ;13-15.09.2017 ; Warszawa, Polska)
Języki publikacji
Abstrakty
Artykuł stanowi przegląd zagadnień związanych z zastosowaniem teorii kodowania do konstrukcji asymetrycznych systemów szyfrowych. Ponadto przedstawiono porównanie wybranych systemów asymetrycznych opartych na teorii kodowania oraz dokonano analizę możliwości wykorzystania ich w praktyce.
In this article we present a survey of issues related to contruction asymmetric encryption systems. A comparison of selected asymmetric systems based on coding theory is also presented, as well as possibilities of using them in practice.
Wydawca
Rocznik
Tom
Strony
789--794, CD
Opis fizyczny
Bibliogr. 17 poz., tab.
Twórcy
Bibliografia
- [1] Marco Baldi, Franco Chiaraluce, Roberto Garello, and Francesco Mininni, 2007, "Quasi-cyclic lowdensity parity-check codes in the McEliece cryptosystem", Communications, 2007. ICC'07. IEEE International Conference on.: IEEE, pp. 951--956.
- [2] Thierry P Berger, Pierre-Louis Cayrel, Philippe Gaborit, and Ayoub Otmani, 2009, "Reducing key length of the McEliece cryptosystem," in International Conference on Cryptology in Africa.: Springer, pp. 77--97.
- [3] Daniel J Bernstein, Tanja Lange, and Christiane Peters, 2010, "Wild McEliece," in International Workshop on Selected Areas in Cryptography.: Springer, 2010, pp. 143--158.
- [4] Whitfield Diffie and Martin Hellman, "New directions in cryptography, 1976," IEEE transactions on Information Theory, vol. 22, no. 6, pp. 644--654.
- [5] Jean-Charles Faugere, Ayoub Otmani, Ludovic Perret, and Jean-Pierre Tillich, "Algebraic cryptanalysis of McEliece variants with compact keys, 2010," in Annual International Conference on the Theory and Applications of Cryptographic Techniques.: Springer, pp. 279--298.
- [6] Philippe Gaborit, 2005, "Shorter keys for code based cryptography", Proceedings of the 2005 International Workshop on Coding and Cryptography (WCC 2005)., pp. 81--91.
- [7] Robert Gallager, 1962, "Low-density parity-check code," IRE Transactions on information theory, vol. 8, no. 1, pp. 21--28.
- [8] J Keith Gibson, 1991, "Equivalent Goppa codes and trapdoors to McEliece’s public key cryptosystem," in Workshop on the Theory and Application of of Cryptographic Techniques.: Springer, pp. 517--521.
- [9] Valerii Denisovich Goppa, 1970, "A new class of linear correcting codes," Problemy Peredachi Informatsii, vol. 6, no. 3, pp. 24--30.
- [10] Pierre Loidreau and Nicolas Sendrier, 2001, "Weak keys in the McEliece public-key cryptosystem", IEEE Transactions on Information Theory, vol. 47, no. 3, pp. 1207--1211.
- [11] Robert J McEliece, 1978, "A public-key cryptosystem based on algebraic coding theory, DSN Progres Report, Jet Propulsion laboratory, vol. 42-44, pp. 114--116.
- [12] Rafael Misoczki, 2013, "Two Approaches for Achieving Efficient Code-Based Cryptosystems", Ph.D. Thesis, https://tel.archives-ouvertes.fr/tel- 00931811.
- [13] Rafael Misoczki and Paulo SLM Barreto, 2009, "Compact McEliece keys from Goppa codes," in International Workshop on Selected Areas in Cryptography.: Springer, pp. 376--392.
- [14] Chris Monico, Joachim Rosenthal, and Amin Shokrollahi, 2000, "Using low density parity check codes in the McEliece cryptosystem," in IEEE International Symposiumon Information Theory, (ISIT 2000), pp. 215.
- [15] Harald Niederreiter, 1986, "Knapsack-type cryptosystems and algebraic coding theory," PROBLEMS OF CONTROL AND INFORMATION THEORY-PROBLEMY UPRAVLENIYA I TEORII INFORMATSII, vol. 15, no. 2, pp. 159--166.
- [16] Agata Pilitowska, 2008, "Algebraiczne aspekty teorii kodów", Politechnika Warszawska.
- [17] Johan van Tilburg, 1988, "On the McEliece publickey cryptosystem," in Conference on the Theory and Application of Cryptography.: Springer, pp. 119--131.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-a1a90291-4f96-4394-824e-c24fe72ab2ee