Open Access
Lecture Notes in Computer Science, pages 129-149
Evolution of the McEliece Public Key Encryption Scheme
1
Department of Mathematics and Computer Science, Aurel Vlaicu University of Arad, Arad, Romania
|
2
Laboratoire LITIS - EA 4108 Université de Rouen - UFR Sciences et Techniques, Saint Etienne du Rouvray, France
|
3
Departament de Mathématiques, Université de Yaounde 1, Yaounde, Cameroun
|
Publication type: Book Chapter
Publication date: 2017-10-28
Journal:
Lecture Notes in Computer Science
Q2
SJR: 0.606
CiteScore: 2.6
Impact factor: —
ISSN: 03029743, 16113349, 18612075, 18612083
Abstract
The evolution of the McEliece encryption scheme is a long and thrilling research process. The code families supposed to securely reduce the key size of the original scheme were often cryptanalyzed and thus the future of the code-based cryptography was many times doubted. Yet from this long evolution emerged a great comprehension and understanding of the main difficulties and advantages that coding theory can offer to the field of public key cryptography. Nowadays code-based cryptography has become one of the most promising solutions to post-quantum cryptography. We analyze in this article the evolution of the main encryption variants coming from this field. We stress out the main security issues and point out some new ideas coming from the Rank based cryptography. A summary of the remaining secure variants is given in Fig. 2.
Found
Found
Top-30
Journals
1
2
3
|
|
Lecture Notes in Computer Science
3 publications, 33.33%
|
|
Sensors
1 publication, 11.11%
|
|
Advances in Mathematics of Communications
1 publication, 11.11%
|
|
Advances in Intelligent Systems and Computing
1 publication, 11.11%
|
|
ACM SIGCAS Computers and Society
1 publication, 11.11%
|
|
Advanced Quantum Technologies
1 publication, 11.11%
|
|
1
2
3
|
Publishers
1
2
3
4
|
|
Springer Nature
4 publications, 44.44%
|
|
MDPI
1 publication, 11.11%
|
|
American Institute of Mathematical Sciences (AIMS)
1 publication, 11.11%
|
|
Institute of Electrical and Electronics Engineers (IEEE)
1 publication, 11.11%
|
|
Association for Computing Machinery (ACM)
1 publication, 11.11%
|
|
Wiley
1 publication, 11.11%
|
|
1
2
3
4
|
- We do not take into account publications without a DOI.
- Statistics recalculated only for publications connected to researchers, organizations and labs registered on the platform.
- Statistics recalculated weekly.
Are you a researcher?
Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
Cite this
GOST |
RIS |
BibTex
Cite this
GOST
Copy
Bucerzan D. et al. Evolution of the McEliece Public Key Encryption Scheme // Lecture Notes in Computer Science. 2017. pp. 129-149.
GOST all authors (up to 50)
Copy
Bucerzan D., Dragoi V., Kalachi H. T. Evolution of the McEliece Public Key Encryption Scheme // Lecture Notes in Computer Science. 2017. pp. 129-149.
Cite this
RIS
Copy
TY - GENERIC
DO - 10.1007/978-3-319-69284-5_10
UR - https://doi.org/10.1007/978-3-319-69284-5_10
TI - Evolution of the McEliece Public Key Encryption Scheme
T2 - Lecture Notes in Computer Science
AU - Bucerzan, Dominic
AU - Dragoi, Vlad
AU - Kalachi, Hervé Talé
PY - 2017
DA - 2017/10/28
PB - Springer Nature
SP - 129-149
SN - 0302-9743
SN - 1611-3349
SN - 1861-2075
SN - 1861-2083
ER -
Cite this
BibTex (up to 50 authors)
Copy
@incollection{2017_Bucerzan,
author = {Dominic Bucerzan and Vlad Dragoi and Hervé Talé Kalachi},
title = {Evolution of the McEliece Public Key Encryption Scheme},
publisher = {Springer Nature},
year = {2017},
pages = {129--149},
month = {oct}
}