Solving simultaneous modular equations of low degree
SIAM Journal on Computing - Special issue on cryptography
Decoding of Reed Solomon codes beyond the error-correction bound
Journal of Complexity
Finding smooth integers in short intervals using CRT decoding
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Proceedings of the 6th IMA International Conference on Cryptography and Coding
Proceedings of the 6th IMA International Conference on Cryptography and Coding
How to Guess l-th Roots Modulo n by Reducing Lattice Bases
AAECC-6 Proceedings of the 6th International Conference, on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Finding Small Roots of Univariate Modular Equations Revisited
Proceedings of the 6th IMA International Conference on Cryptography and Coding
Finding smooth integers in short intervals using CRT decoding
Journal of Computer and System Sciences - Special issue on STOC 2000
Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes
FOCS '98 Proceedings of the 39th Annual Symposium on Foundations of Computer Science
On the complexity of polynomial matrix computations
ISSAC '03 Proceedings of the 2003 international symposium on Symbolic and algebraic computation
List decoding of error-correcting codes
List decoding of error-correcting codes
Modern Computer Algebra
Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
Attacking and Defending the McEliece Cryptosystem
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Factoring pq2 with Quadratic Forms: Nice Cryptanalyses
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Finding a small root of a univariate modular equation
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Finding a small root of a bivariate integer equation; factoring with high bits known
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Key equations for list decoding of Reed-Solomon codes and how to solve them
Journal of Symbolic Computation
Efficient interpolation in the Guruswami-Sudan algorithm
IEEE Transactions on Information Theory
Proceedings of the 17th international conference on Selected areas in cryptography
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Algebraic Complexity Theory
Proceedings of the Third international conference on Coding and cryptology
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
List decoding for binary Goppa codes
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
Improved decoding of Reed-Solomon and algebraic-geometry codes
IEEE Transactions on Information Theory
Algebraic generalization of BCH-Goppa-Helgert codes
IEEE Transactions on Information Theory
Linear diophantine equations over polynomials and soft decoding of Reed-Solomon codes
IEEE Transactions on Information Theory
New List Decoding Algorithms for Reed–Solomon and BCH Codes
IEEE Transactions on Information Theory
PQCrypto'11 Proceedings of the 4th international conference on Post-Quantum Cryptography
McBits: fast constant-time code-based cryptography
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Hi-index | 0.00 |
This paper presents a simplified list-decoding algorithm to correct any number w of errors in any alternant code of any length n with any designed distance t+1 over any finite field Fq ; in particular, in the classical Goppa codes used in the McEliece and Niederreiter public-key cryptosystems. The algorithm is efficient for w close to, and in many cases slightly beyond, the Fq Johnson bound $J'=n'-\sqrt{n'(n'-t-1)}$ where n′=n(q−1)/q, assuming t+1≤n′. In the typical case that $qn/t\in (\lg n)^{O(1)}$ and that the parent field has $(\lg n)^{O(1)}$ bits, the algorithm uses $n(\lg n)^{O(1)}$ bit operations for $w\le J'-n/(\lg n)^{O(1)}$ ; O(n4.5) bit operations for $w\le J'+o((\lg n)/\lg\lg n)$ ; and nO(1) bit operations for $w\le J'+O((\lg n)/\lg\lg n)$ .