Ítem
Solo Metadatos
A polynomial-time attack on the BBCRS scheme
dc.creator | Couvreur, Alain | spa |
dc.creator | Otmani, Ayoub | spa |
dc.creator | Tillich, Jean-Pierre | spa |
dc.creator | Gauthier-Umaña, Valérie | spa |
dc.date.accessioned | 2020-05-25T23:56:49Z | |
dc.date.available | 2020-05-25T23:56:49Z | |
dc.date.created | 2015 | spa |
dc.description.abstract | The BBCRS scheme is a variant of the McEliece public-key encryption scheme where the hiding phase is performed by taking the inverse of a matrix which is of the form T + R where T is a sparse matrix with average row/column weight equal to a very small quantity m, usually m and lt; 2, and R is a matrix of small rank z ? 1. The rationale of this new transformation is the reintroduction of families of codes, like generalized Reed-Solomon codes, that are famously known for representin insecure choices. We present a key-recovery attack when z = 1 and m is chosen between 1 and 1+R+O(1/?n) where R denotes the code rate. This attack has complexity O(n6) and breaks all the parameters suggested in the literature. © International Association for Cryptologic Research 2015. | eng |
dc.format.mimetype | application/pdf | |
dc.identifier.doi | https://doi.org/10.1007/978-3-662-46447-2_8 | |
dc.identifier.uri | https://repository.urosario.edu.co/handle/10336/22532 | |
dc.language.iso | eng | spa |
dc.publisher | Springer Verlag | spa |
dc.relation.citationEndPage | 193 | |
dc.relation.citationStartPage | 175 | |
dc.relation.citationTitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.relation.citationVolume | Vol. 9020 | |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol.9020,(2015); pp. 175-193 | spa |
dc.relation.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84925252708&doi=10.1007%2f978-3-662-46447-2_8&partnerID=40&md5=3e71bc41688d2344d74169ff7a4332a9 | spa |
dc.rights.accesRights | info:eu-repo/semantics/openAccess | |
dc.rights.acceso | Abierto (Texto Completo) | spa |
dc.source.instname | instname:Universidad del Rosario | spa |
dc.source.reponame | reponame:Repositorio Institucional EdocUR | spa |
dc.subject.keyword | Codes (symbols) | spa |
dc.subject.keyword | Cryptography | spa |
dc.subject.keyword | Matrix algebra | spa |
dc.subject.keyword | Polynomial approximation | spa |
dc.subject.keyword | Reed-Solomon codes | spa |
dc.subject.keyword | Code-based cryptography | spa |
dc.subject.keyword | Component wise | spa |
dc.subject.keyword | Distinguishers | spa |
dc.subject.keyword | Generalized reed-solomon codes | spa |
dc.subject.keyword | Key recovery | spa |
dc.subject.keyword | Public key cryptography | spa |
dc.subject.keyword | Code-based cryptography | spa |
dc.subject.keyword | Component-wise product of codes | spa |
dc.subject.keyword | Distinguisher | spa |
dc.subject.keyword | Generalized Reed-Solomon codes | spa |
dc.subject.keyword | Key-recovery | spa |
dc.title | A polynomial-time attack on the BBCRS scheme | spa |
dc.type | conferenceObject | eng |
dc.type.hasVersion | info:eu-repo/semantics/publishedVersion | |
dc.type.spa | Documento de conferencia | spa |