Variations of the McEliece cryptosystem

J Bolkema, H Gluesing-Luerssen, CA Kelley… - Algebraic Geometry for …, 2017 - Springer
Two variations of the McEliece cryptosystem are presented. The first is based on a relaxation
of the column permutation in the classical McEliece scrambling process. This is done in such …

Security of generalised Reed–Solomon code‐based cryptosystems

M Baldi, F Chiaraluce, J Rosenthal… - IET Information …, 2019 - Wiley Online Library
In this study, the authors elaborate on a recently proposed variant of the public‐key
McEliece and Niederreiter cryptosystems using generalised Reed–Solomon (GRS) codes …

Weight two masking of the Reed-Solomon structure in conjunction with list decoding

K Khaturia, J Rosenthal, V Weger - 2018 - zora.uzh.ch
We present a code-based cryptosystem, in which we use Reed-Solomon codes as secret
codes and a weight two matrix for masking, to make the system secure against attacks …

Pregled post-kvantnih kriptografskih sustava

K Čurla - 2019 - repozitorij.pmf.unizg.hr
Sažetak Ovaj rad bavi se alternativnim kriptosustavima koji odolijevaju napadima kvantnih
računala. Rad je podijeljen u 3 poglavlja. U prvom poglavlju dajemo motivaciju za …

[PDF][PDF] Algebraic Study of Some Recent Asymmetric Cryptosystems

K Karan, J Rosenthal, A Kresch, E Gorla - user.math.uzh.ch
In this dissertation, we apply various algebraic techniques to: develop some codebased
cryptosystems; break some noncommutative cryptographic protocols; and theoretically …

Concatenated codes, matrix-product codes and their schur product

T Ulutaş - 2021 - research.sabanciuniv.edu
The aim of thesis is two-fold. Firstly, we introduce concatenated codes, matrixproduct codes
and elaborate on their relation. It is known that a matrix-product code can be seen as a …

An Overview on Post-Quantum Cryptography with an Emphasis on Code based Systems

J Rosenthal - Finite Geometries Fifth Irsee Conference, 2017 - cage.ugent.be
With the realization that a quantum computer would make many practically used public key
cryptographic systems obsolete (compare with the reports [1, 2]) it became an important …