goppa codes
Recently Published Documents


TOTAL DOCUMENTS

208
(FIVE YEARS 19)

H-INDEX

21
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Giuseppe Filippone

Abstract Given an Edwards curve, we determine a basis for the Riemann-Roch space of any divisor whose support does not contain any of the two singular points. This basis allows us to compute a generating matrix for an algebraic-geometric Goppa code over the Edwards curve.


2021 ◽  
Author(s):  
Hedongliang Liu ◽  
Sabine Pircher ◽  
Alexander Zeh ◽  
Antonia Wachter-Zeh
Keyword(s):  

2021 ◽  
Vol 36 (2) ◽  
pp. 15-19
Author(s):  
Yu.S. Kasatkina ◽  
◽  
A.S. Kasatkina ◽  
Keyword(s):  

The paper is aimed at analyzing of the classical McEliece and Niederreiter cryptosystems as well as theQuasi-Cyclic MDPC McEliece cipher in a context of the post-quantum network security. Theoretical foundations ofthe aforesaid cryptographic schemes are considered. The characteristics of the given cryptosystems and otherasymmetric encryption schemes are analyzed. The cipher metrics, which are considered in the paper, includecryptographic strength, performance, public key size and length of ciphertext. The binary Goppa codes are describedin the context of their role for the cryptanalytic resistance of the classic McEliece and Niederreiter schemes. Thecrucial advantages and drawbacks of the aforementioned cryptosystems are analyzed. The prospects for applicationof these ciphers to the network security protocols are outlined. The investigations, which are aimed at finding waysto reduce the public key sizes and improve the energy efficiency of the given ciphers, are briefly described. A neweducational module “Introduction to Post-Quantum Cryptography” is presented


2020 ◽  
Vol 343 (9) ◽  
pp. 111962
Author(s):  
Markel Epelde ◽  
Xabier Larrucea ◽  
Ignacio F. Rúa
Keyword(s):  

2020 ◽  
Vol 26 (3) ◽  
pp. 17-29
Author(s):  
S. M. Ratseev ◽  
O. I. Cherevatenko

The article is devoted to the decoding algorithms for generalized Reed Solomon codes with errorsand erasures. These algorithms are based on Gao algorithm, Sugiyama algorithm, Berlekamp Massey algorithm (Peterson Gorenstein Zierler algorithm). The first of these algorithms belongs to syndrome-free decoding algorithms, the others to syndrome decoding algorithms. The relevance of these algorithms is that they are applicable for decoding Goppa codes, which are the basis of some promising post-quantum cryptosystems. These algorithms are applicable for Goppa codes over an arbitrary field, as opposed to the well-known Patterson decoding algorithm for binary Goppa codes.


2020 ◽  
Vol Volume 12, issue 1 ◽  
Author(s):  
Julian Danner ◽  
Martin Kreuzer

A fault injection framework for the decryption algorithm of the Niederreiter public-key cryptosystem using binary irreducible Goppa codes and classical decoding techniques is described. In particular, we obtain low-degree polynomial equations in parts of the secret key. For the resulting system of polynomial equations, we present an efficient solving strategy and show how to extend certain solutions to alternative secret keys. We also provide estimates for the expected number of required fault injections, apply the framework to state-of-the-art security levels, and propose countermeasures against this type of fault attack. Comment: 20 pages


Sign in / Sign up

Export Citation Format

Share Document