On the security of some cryptosystems based on error-correcting codes View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

1995

AUTHORS

Florent Chabaud

ABSTRACT

A certain number of public-key cryptosystems based on error-correcting codes have been proposed as an alternative to algorithms based on number theory. In this paper, we analyze algorithms that can be used to attack such cryptosystems in a very precise way, and optimize them. Thus, we obtain some more efficient attacks than those previously known. Even if they remain unfeasible, they indicate the cryptosystems parameters forbidden by the existence of these algorithms. More... »

PAGES

131-139

Book

TITLE

Advances in Cryptology — EUROCRYPT'94

ISBN

978-3-540-60176-0
978-3-540-44717-7

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/bfb0053430

DOI

http://dx.doi.org/10.1007/bfb0053430

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1045273682


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Laboratoire d'Informatique de l'ENS, 45, rue d'Ulm, 75230, Paris Cedex 05, France", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Laboratoire d'Informatique de l'ENS, 45, rue d'Ulm, 75230, Paris Cedex 05, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Chabaud", 
        "givenName": "Florent", 
        "id": "sg:person.016054140265.99", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016054140265.99"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "1995", 
    "datePublishedReg": "1995-01-01", 
    "description": "A certain number of public-key cryptosystems based on error-correcting codes have been proposed as an alternative to algorithms based on number theory. In this paper, we analyze algorithms that can be used to attack such cryptosystems in a very precise way, and optimize them. Thus, we obtain some more efficient attacks than those previously known. Even if they remain unfeasible, they indicate the cryptosystems parameters forbidden by the existence of these algorithms.", 
    "editor": [
      {
        "familyName": "De Santis", 
        "givenName": "Alfredo", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/bfb0053430", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-60176-0", 
        "978-3-540-44717-7"
      ], 
      "name": "Advances in Cryptology \u2014 EUROCRYPT'94", 
      "type": "Book"
    }, 
    "keywords": [
      "error-correcting codes", 
      "public key cryptosystem", 
      "such cryptosystems", 
      "cryptosystem parameters", 
      "efficient attack", 
      "cryptosystem", 
      "algorithm", 
      "code", 
      "certain number", 
      "precise way", 
      "number theory", 
      "security", 
      "attacks", 
      "way", 
      "number", 
      "alternative", 
      "parameters", 
      "theory", 
      "existence", 
      "paper"
    ], 
    "name": "On the security of some cryptosystems based on error-correcting codes", 
    "pagination": "131-139", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1045273682"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/bfb0053430"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/bfb0053430", 
      "https://app.dimensions.ai/details/publication/pub.1045273682"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-08-04T17:14", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220804/entities/gbq_results/chapter/chapter_132.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/bfb0053430"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/bfb0053430'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/bfb0053430'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/bfb0053430'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/bfb0053430'


 

This table displays all metadata directly associated to this object as RDF triples.

79 TRIPLES      22 PREDICATES      45 URIs      38 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/bfb0053430 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N343865067e26431dbd4b303dd953c708
4 schema:datePublished 1995
5 schema:datePublishedReg 1995-01-01
6 schema:description A certain number of public-key cryptosystems based on error-correcting codes have been proposed as an alternative to algorithms based on number theory. In this paper, we analyze algorithms that can be used to attack such cryptosystems in a very precise way, and optimize them. Thus, we obtain some more efficient attacks than those previously known. Even if they remain unfeasible, they indicate the cryptosystems parameters forbidden by the existence of these algorithms.
7 schema:editor Nfdb2913022c04116a8bc5b1b25f9bc6f
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N1fe6fa6fed7147298961a4088629aadd
11 schema:keywords algorithm
12 alternative
13 attacks
14 certain number
15 code
16 cryptosystem
17 cryptosystem parameters
18 efficient attack
19 error-correcting codes
20 existence
21 number
22 number theory
23 paper
24 parameters
25 precise way
26 public key cryptosystem
27 security
28 such cryptosystems
29 theory
30 way
31 schema:name On the security of some cryptosystems based on error-correcting codes
32 schema:pagination 131-139
33 schema:productId N2845488de0bb4bd8a917d95eff687585
34 N7a7363524ae34fdab22553745debc855
35 schema:publisher Nc2165a8d1e5b418596cfc3155021d5aa
36 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045273682
37 https://doi.org/10.1007/bfb0053430
38 schema:sdDatePublished 2022-08-04T17:14
39 schema:sdLicense https://scigraph.springernature.com/explorer/license/
40 schema:sdPublisher N67b54d188f5c4958a8cadb1f87347dbf
41 schema:url https://doi.org/10.1007/bfb0053430
42 sgo:license sg:explorer/license/
43 sgo:sdDataset chapters
44 rdf:type schema:Chapter
45 N1fe6fa6fed7147298961a4088629aadd schema:isbn 978-3-540-44717-7
46 978-3-540-60176-0
47 schema:name Advances in Cryptology — EUROCRYPT'94
48 rdf:type schema:Book
49 N2845488de0bb4bd8a917d95eff687585 schema:name doi
50 schema:value 10.1007/bfb0053430
51 rdf:type schema:PropertyValue
52 N343865067e26431dbd4b303dd953c708 rdf:first sg:person.016054140265.99
53 rdf:rest rdf:nil
54 N67b54d188f5c4958a8cadb1f87347dbf schema:name Springer Nature - SN SciGraph project
55 rdf:type schema:Organization
56 N7399913eb64e4f708d6b50930e0bc70f schema:familyName De Santis
57 schema:givenName Alfredo
58 rdf:type schema:Person
59 N7a7363524ae34fdab22553745debc855 schema:name dimensions_id
60 schema:value pub.1045273682
61 rdf:type schema:PropertyValue
62 Nc2165a8d1e5b418596cfc3155021d5aa schema:name Springer Nature
63 rdf:type schema:Organisation
64 Nfdb2913022c04116a8bc5b1b25f9bc6f rdf:first N7399913eb64e4f708d6b50930e0bc70f
65 rdf:rest rdf:nil
66 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
67 schema:name Information and Computing Sciences
68 rdf:type schema:DefinedTerm
69 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
70 schema:name Data Format
71 rdf:type schema:DefinedTerm
72 sg:person.016054140265.99 schema:affiliation grid-institutes:None
73 schema:familyName Chabaud
74 schema:givenName Florent
75 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016054140265.99
76 rdf:type schema:Person
77 grid-institutes:None schema:alternateName Laboratoire d'Informatique de l'ENS, 45, rue d'Ulm, 75230, Paris Cedex 05, France
78 schema:name Laboratoire d'Informatique de l'ENS, 45, rue d'Ulm, 75230, Paris Cedex 05, France
79 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...