On the security of some cryptosystems based on error-correcting codes View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

1995

AUTHORS

Florent Chabaud

ABSTRACT

A certain number of public-key cryptosystems based on error-correcting codes have been proposed as an alternative to algorithms based on number theory. In this paper, we analyze algorithms that can be used to attack such cryptosystems in a very precise way, and optimize them. Thus, we obtain some more efficient attacks than those previously known. Even if they remain unfeasible, they indicate the cryptosystems parameters forbidden by the existence of these algorithms. More... »

PAGES

131-139

Book

TITLE

Advances in Cryptology — EUROCRYPT'94

ISBN

978-3-540-60176-0
978-3-540-44717-7

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/bfb0053430

DOI

http://dx.doi.org/10.1007/bfb0053430

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1045273682


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Laboratoire d'Informatique de l'ENS, 45, rue d'Ulm, 75230, Paris Cedex 05, France", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Laboratoire d'Informatique de l'ENS, 45, rue d'Ulm, 75230, Paris Cedex 05, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Chabaud", 
        "givenName": "Florent", 
        "id": "sg:person.016054140265.99", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016054140265.99"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "1995", 
    "datePublishedReg": "1995-01-01", 
    "description": "A certain number of public-key cryptosystems based on error-correcting codes have been proposed as an alternative to algorithms based on number theory. In this paper, we analyze algorithms that can be used to attack such cryptosystems in a very precise way, and optimize them. Thus, we obtain some more efficient attacks than those previously known. Even if they remain unfeasible, they indicate the cryptosystems parameters forbidden by the existence of these algorithms.", 
    "editor": [
      {
        "familyName": "De Santis", 
        "givenName": "Alfredo", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/bfb0053430", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-60176-0", 
        "978-3-540-44717-7"
      ], 
      "name": "Advances in Cryptology \u2014 EUROCRYPT'94", 
      "type": "Book"
    }, 
    "keywords": [
      "error-correcting codes", 
      "public key cryptosystem", 
      "such cryptosystems", 
      "cryptosystem parameters", 
      "efficient attack", 
      "cryptosystem", 
      "algorithm", 
      "code", 
      "certain number", 
      "precise way", 
      "number theory", 
      "security", 
      "attacks", 
      "way", 
      "number", 
      "alternative", 
      "parameters", 
      "theory", 
      "existence", 
      "paper"
    ], 
    "name": "On the security of some cryptosystems based on error-correcting codes", 
    "pagination": "131-139", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1045273682"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/bfb0053430"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/bfb0053430", 
      "https://app.dimensions.ai/details/publication/pub.1045273682"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-08-04T17:14", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220804/entities/gbq_results/chapter/chapter_132.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/bfb0053430"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/bfb0053430'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/bfb0053430'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/bfb0053430'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/bfb0053430'


 

This table displays all metadata directly associated to this object as RDF triples.

79 TRIPLES      22 PREDICATES      45 URIs      38 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/bfb0053430 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N1c29a626c5254643ac392787e37869ce
4 schema:datePublished 1995
5 schema:datePublishedReg 1995-01-01
6 schema:description A certain number of public-key cryptosystems based on error-correcting codes have been proposed as an alternative to algorithms based on number theory. In this paper, we analyze algorithms that can be used to attack such cryptosystems in a very precise way, and optimize them. Thus, we obtain some more efficient attacks than those previously known. Even if they remain unfeasible, they indicate the cryptosystems parameters forbidden by the existence of these algorithms.
7 schema:editor N3c1f248070c24f2caac1b477e27c25db
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N8b45e130bedb4054aa14413bb7754e4a
11 schema:keywords algorithm
12 alternative
13 attacks
14 certain number
15 code
16 cryptosystem
17 cryptosystem parameters
18 efficient attack
19 error-correcting codes
20 existence
21 number
22 number theory
23 paper
24 parameters
25 precise way
26 public key cryptosystem
27 security
28 such cryptosystems
29 theory
30 way
31 schema:name On the security of some cryptosystems based on error-correcting codes
32 schema:pagination 131-139
33 schema:productId N75f6e9fd87704484942c371ac8aa994d
34 Na1559379fad240a682b963017c7d8e01
35 schema:publisher N21fe21d911514ba8a020c8a3c2da1b0c
36 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045273682
37 https://doi.org/10.1007/bfb0053430
38 schema:sdDatePublished 2022-08-04T17:14
39 schema:sdLicense https://scigraph.springernature.com/explorer/license/
40 schema:sdPublisher Nbfa295a12fbb4a10aae7c46ef01475e4
41 schema:url https://doi.org/10.1007/bfb0053430
42 sgo:license sg:explorer/license/
43 sgo:sdDataset chapters
44 rdf:type schema:Chapter
45 N1c29a626c5254643ac392787e37869ce rdf:first sg:person.016054140265.99
46 rdf:rest rdf:nil
47 N21fe21d911514ba8a020c8a3c2da1b0c schema:name Springer Nature
48 rdf:type schema:Organisation
49 N304ebea4b39448c4b7e5d622a9fa7c48 schema:familyName De Santis
50 schema:givenName Alfredo
51 rdf:type schema:Person
52 N3c1f248070c24f2caac1b477e27c25db rdf:first N304ebea4b39448c4b7e5d622a9fa7c48
53 rdf:rest rdf:nil
54 N75f6e9fd87704484942c371ac8aa994d schema:name dimensions_id
55 schema:value pub.1045273682
56 rdf:type schema:PropertyValue
57 N8b45e130bedb4054aa14413bb7754e4a schema:isbn 978-3-540-44717-7
58 978-3-540-60176-0
59 schema:name Advances in Cryptology — EUROCRYPT'94
60 rdf:type schema:Book
61 Na1559379fad240a682b963017c7d8e01 schema:name doi
62 schema:value 10.1007/bfb0053430
63 rdf:type schema:PropertyValue
64 Nbfa295a12fbb4a10aae7c46ef01475e4 schema:name Springer Nature - SN SciGraph project
65 rdf:type schema:Organization
66 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
67 schema:name Information and Computing Sciences
68 rdf:type schema:DefinedTerm
69 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
70 schema:name Data Format
71 rdf:type schema:DefinedTerm
72 sg:person.016054140265.99 schema:affiliation grid-institutes:None
73 schema:familyName Chabaud
74 schema:givenName Florent
75 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016054140265.99
76 rdf:type schema:Person
77 grid-institutes:None schema:alternateName Laboratoire d'Informatique de l'ENS, 45, rue d'Ulm, 75230, Paris Cedex 05, France
78 schema:name Laboratoire d'Informatique de l'ENS, 45, rue d'Ulm, 75230, Paris Cedex 05, France
79 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...