Quantum resistant random linear code based public key encryption scheme RLCE

@article{Wang2015QuantumRR,
  title={Quantum resistant random linear code based public key encryption scheme RLCE},
  author={Yongge Wang},
  journal={2016 IEEE International Symposium on Information Theory (ISIT)},
  year={2015},
  pages={2519-2523}
}
Lattice based encryption schemes and linear code based encryption schemes have received extensive attention in recent years since they have been considered as post-quantum candidate encryption schemes. Though LLL reduction algorithm has been one of the major cryptanalysis techniques for lattice based cryptographic systems, key recovery cryptanalysis techniques for linear code based cryptographic systems are generally scheme specific. In recent years, several important techniques such as… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 20 CITATIONS

Revised Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes

  • Yongge Wang
  • Computer Science
  • IACR Cryptology ePrint Archive
  • 2017
VIEW 8 EXCERPTS
CITES METHODS & BACKGROUND

An encryption scheme based on Random Split of St-Gen codes

VIEW 4 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use case

VIEW 3 EXCERPTS
CITES BACKGROUND & METHODS

RLCE Key Encapsulation Mechanism ( RLCE-KEM ) Specification

  • Yongge Wang
  • 2019
VIEW 3 EXCERPTS
CITES METHODS & BACKGROUND

polarRLCE: A New Code-Based Cryptosystem Using Polar Codes

VIEW 2 EXCERPTS
CITES BACKGROUND & METHODS

An efficient structural attack on NIST submission DAGS

VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 37 REFERENCES

Attacking and defending the McEliece cryptosystem

VIEW 11 EXCERPTS
HIGHLY INFLUENTIAL

Polynomial Time Attack on Wild McEliece Over Quadratic Extensions

VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes

VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

How to Mask the Structure of Codes for a Cryptographic Use

VIEW 11 EXCERPTS
HIGHLY INFLUENTIAL

L

  • J.-C. Faugere, V. Gauthier-Umaña, A. Otmani
  • Perre t, and J.-P. Tillich. A distinguisher for high-rate mceliece cryptosystems. Information Theory, IEEE Transactions on , 59(10):6830–6844
  • 2013
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

Information-Set Decoding for Linear Codes over Fq

VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL