An observation on the security of McEliece's public-key cryptosystem
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
A U32,17,14e-Geometric code coming from a singular curve
on Coding theory and applications
Efficient computation of zero-dimensional Gro¨bner bases by change of ordering
Journal of Symbolic Computation
An algorithm for computing an integral basis in an algebraic function field
Journal of Symbolic Computation
Efficient algorithms for the Riemann-Roch problem and for addition in the Jacobian of a curve
Journal of Symbolic Computation
McEliece Public Key Cryptosystems Using Algebraic-Geometric Codes
Designs, Codes and Cryptography
Rational parametrizations of algebraic curves using a canonical divisor
Journal of Symbolic Computation - Special issue: parametric algebraic curves and applications
Finding a basis of a linear system with pairwise distinct discrete valuations on an algebraic curve
Journal of Symbolic Computation
Computing Riemann---Roch spaces in algebraic function fields and related topics
Journal of Symbolic Computation
On Computational Complexity of Some Algebraic Curves Over Finite Fields
AAECC-3 Proceedings of the 3rd International Conference on Algebraic Algorithms and Error-Correcting Codes
Computation in Algebraic Function Fields for Effective Construction of Algebraic-Geometric Codes
AAECC-11 Proceedings of the 11th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
A method for finding codewords of small weight
Proceedings of the 3rd International Colloquium on Coding Theory and Applications
A Generalized Birthday Problem
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
How to Achieve a McEliece-Based Digital Signature Scheme
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Symbolic Hamburger-Noether expressions of plane curves and applications to AG codes
Mathematics of Computation
How to Mask the Structure of Codes for a Cryptographic Use
Designs, Codes and Cryptography
Cryptanalysis of the Sidelnikov Cryptosystem
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Attacking and Defending the McEliece Cryptosystem
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
Side Channels in the McEliece PKC
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
Reducing Key Length of the McEliece Cryptosystem
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
CRYPTO '09 Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
MicroEliece: McEliece for Embedded Devices
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
Security Bounds for the Design of Code-Based Cryptosystems
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A timing attack against patterson algorithm in the McEliece PKC
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Smaller decoding exponents: ball-collision decoding
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
A family of fast syndrome based cryptographic hash functions
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Journal of Cryptology
Algebraic cryptanalysis of mceliece variants with compact keys
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Cryptanalysis of the niederreiter public key scheme based on GRS subcodes
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
An attack on a modified niederreiter encryption scheme
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Decoding random linear codes in Õ(20.054n)
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Decoding random binary linear codes in 2n/20: how 1 + 1 = 0 improves information set decoding
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
On the decoding of algebraic-geometric codes
IEEE Transactions on Information Theory - Part 1
Effective construction of algebraic geometry codes
IEEE Transactions on Information Theory - Part 1
IEEE Transactions on Information Theory
Improved decoding of Reed-Solomon and algebraic-geometry codes
IEEE Transactions on Information Theory
Finding the permutation between equivalent linear codes: the support splitting algorithm
IEEE Transactions on Information Theory
Weak keys in the McEliece public-key cryptosystem
IEEE Transactions on Information Theory
Which linear codes are algebraic-geometric?
IEEE Transactions on Information Theory
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
IEEE Transactions on Information Theory
On the Structure of Order Domains
Finite Fields and Their Applications
Improved Two-Point Codes on Hermitian Curves
IEEE Transactions on Information Theory
A new version of mceliece PKC based on convolutional codes
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
The non-gap sequence of a subcode of a generalized Reed---Solomon code
Designs, Codes and Cryptography
Hi-index | 0.00 |
Code-based cryptography is an interesting alternative to classic number-theoretic public key cryptosystem since it is conjectured to be secure against quantum computer attacks. Many families of codes have been proposed for these cryptosystems such as algebraic geometry codes. In Marquez-Corbella et al. (2012) - for so called very strong algebraic geometry codes C=C"L(X,P,E), where X is an algebraic curve over F"q, P is an n-tuple of mutually distinct F"q-rational points of X and E is a divisor of X with disjoint support from P - it was shown that an equivalent representation C=C"L(Y,Q,F) can be found. The n-tuple of points is obtained directly from a generator matrix of C, where the columns are viewed as homogeneous coordinates of these points. The curve Y is given by I"2(Y), the homogeneous elements of degree 2 of the vanishing ideal I(Y). Furthermore, it was shown that I"2(Y) can be computed efficiently as the kernel of certain linear map. What was not shown was how to get the divisor F and how to obtain efficiently an adequate decoding algorithm for the new representation. The main result of this paper is an efficient computational approach to the first problem, that is getting F. The security status of the McEliece public key cryptosystem using algebraic geometry codes is still not completely settled and is left as an open problem.