Vulnerabilities of "McEliece in the World of Escher"

@inproceedings{Moody2015VulnerabilitiesO,
  title={Vulnerabilities of "McEliece in the World of Escher"},
  author={Dustin Moody and Ray A. Perlner},
  booktitle={PQCrypto},
  year={2015}
}
Recently, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding, blockwise triangular private keys, and a nonuniform error pattern based on "generalized error sets." The general approach was referred to as McEliece in the World of Escher. This paper demonstrates attacks which are significantly cheaper than the claimed security level of the parameters given by Gligoroski et al. We implemented an attack on the proposed 80-bit parameters which was able to… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-7 OF 7 CITATIONS

A Digital Signature Scheme Based on Random Split of St-Gen Codes

VIEW 9 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

An encryption scheme based on Random Split of St-Gen codes

VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Semantic Security and Key-Privacy with Random Split of St-Gen Codes

VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A Modified pqsigRM: RM Code-Based Signature Scheme

VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 17 REFERENCES

McEliece in the world of Escher

VIEW 16 EXCERPTS
HIGHLY INFLUENTIAL

An Efficient Attack on All Concrete KKS Proposals

VIEW 1 EXCERPT