Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Alternant code"'
Autor:
Sisi Miao, Christian Senger
Publikováno v:
ISIT
Dual-containing classical error-correcting codes can be used in the Calderbank-Shor-Steane (CSS) construction for quantum error-correcting codes (QECCs). Dual-containing Bose-Chaudhuri-Hocquenghem (BCH) codes have been extensively studied in this reg
Publikováno v:
CBC 2019-7th Code-Based Cryptography Workshop
CBC 2019-7th Code-Based Cryptography Workshop, May 2019, Darmstadt, Germany. pp.86-101, ⟨10.1007/978-3-030-25922-8_5⟩
Code-Based Cryptography ISBN: 9783030259211
CBC
CBC 2019-7th Code-Based Cryptography Workshop, May 2019, Darmstadt, Germany. pp.86-101, ⟨10.1007/978-3-030-25922-8_5⟩
Code-Based Cryptography ISBN: 9783030259211
CBC
DAGS scheme is a key encapsulation mechanism (KEM) based on quasi-dyadic alternant codes that was submitted to NIST standardization process for a quantum resistant public key algorithm. Recently an algebraic attack was devised by Barelli and Couvreur
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::966cb7976704a2caf839bbf597f7fcf4
https://hal.archives-ouvertes.fr/hal-02125330
https://hal.archives-ouvertes.fr/hal-02125330
Publikováno v:
The Journal of Advanced Research in Applied Mathematics. 4:66-77
Publikováno v:
Trends in Computational and Applied Mathematics. 12:79-89
In this paper, we introduced new construction techniques of BCH, alternant, Goppa, Srivastava codes through the semigroup ring B[X; 13Z0] instead of the polynomial ring B[X; Z0], where B is a finite commutative ring with identity, and for these const
Publikováno v:
Computational & Applied Mathematics, Volume: 30, Issue: 2, Pages: 349-366, Published: 2011
Scopus
Repositório Institucional da UNESP
Universidade Estadual Paulista (UNESP)
instacron:UNESP
Computational & Applied Mathematics v.30 n.2 2011
Computational & Applied Mathematics
Sociedade Brasileira de Matemática Aplicada e Computacional (SBMAC)
instacron:SBMAC
Scopus
Repositório Institucional da UNESP
Universidade Estadual Paulista (UNESP)
instacron:UNESP
Computational & Applied Mathematics v.30 n.2 2011
Computational & Applied Mathematics
Sociedade Brasileira de Matemática Aplicada e Computacional (SBMAC)
instacron:SBMAC
Submitted by Vitor Silverio Rodrigues (vitorsrodrigues@reitoria.unesp.br) on 2014-05-27T11:25:58Z No. of bitstreams: 0Bitstream added on 2014-05-27T14:47:19Z : No. of bitstreams: 1 2-s2.0-80051788111.pdf: 196564 bytes, checksum: 74c42aa5547e69f679a34
Publikováno v:
Proceedings of Second International Conference on Cryptology-AFRICACRYPT 2009
Proceedings of Second International Conference on Cryptology-AFRICACRYPT 2009, Jun 2009, Gammarth, Tunisia. pp.77-97, ⟨10.1007/978-3-642-02384-2_6⟩
Progress in Cryptology – AFRICACRYPT 2009 ISBN: 9783642023835
AFRICACRYPT
Proceedings of Second International Conference on Cryptology-AFRICACRYPT 2009, Jun 2009, Gammarth, Tunisia. pp.77-97, ⟨10.1007/978-3-642-02384-2_6⟩
Progress in Cryptology – AFRICACRYPT 2009 ISBN: 9783642023835
AFRICACRYPT
The McEliece cryptosystem is one of the oldest public-key cryptosystems ever designed. It is also the first public-key cryptosystem based on linear error-correcting codes. Its main advantage is to have very fast encryption and decryption functions. H
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::96a3f3090d1374a148903d853815618f
https://hal.archives-ouvertes.fr/hal-01081727/file/ACTI-BERGER-2009-2.pdf
https://hal.archives-ouvertes.fr/hal-01081727/file/ACTI-BERGER-2009-2.pdf
For any given positive integer $m$, a necessary and sufficient condition for the existence of Type I $m$-adic constacyclic codes is given. Further, for any given integer $s$, a necessary and sufficient condition for $s$ to be a multiplier of a Type I
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::76c47df75a4574ea1d2fd2f2104fc0d9
http://arxiv.org/abs/1407.1905
http://arxiv.org/abs/1407.1905
Autor:
Dianwu Yue, Guangzeng Feng
Publikováno v:
Journal of Electronics (China). 17:352-356
By applying a result from geometric Goppa codes, due to H.Schtenoth, the true dimension of certain alternant codes is calculated. The results lead in many cases to an improvement of the usual lower bound for the dimension.
Publikováno v:
Designs, Codes and Cryptography. 20:125-141
We define alternant codes over a commutative ring R and a corresponding key equation. We show that when the ring is a domain, e.g. the p-adic integers, the error-locator polynomial is the unique monic minimal polynomial (equivalently, the unique shor
Autor:
Bernstein, D.J., Yang, B.Y.
Publikováno v:
Post-Quantum Cryptography ISBN: 9783642254048
PQCrypto
Post-Quantum Cryptography (4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011. Proceedings), 200-216
STARTPAGE=200;ENDPAGE=216;TITLE=Post-Quantum Cryptography (4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011. Proceedings)
PQCrypto
Post-Quantum Cryptography (4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011. Proceedings), 200-216
STARTPAGE=200;ENDPAGE=216;TITLE=Post-Quantum Cryptography (4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011. Proceedings)
This paper presents a simplified list-decoding algorithm to correct any number w of errors in any alternant code of any length n with any designed distance t+1 over any finite field Fq ; in particular, in the classical Goppa codes used in the McEliec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4f8781e87c6d1d4910bd98264e55b517
https://research.tue.nl/en/publications/7a1f42b0-fbd1-4bd2-aa75-2d67295abfa2
https://research.tue.nl/en/publications/7a1f42b0-fbd1-4bd2-aa75-2d67295abfa2