Voir la notice de l'article provenant de la source Math-Net.Ru
@article{MAIS_2017_24_2_a8, author = {V. M. Deundyak and Yu. V. Kosolapov and E. A. Lelyuk}, title = {Decoding the tensor product of $ \mathrm{MLD} $ codes and applications for code cryptosystems}, journal = {Modelirovanie i analiz informacionnyh sistem}, pages = {239--252}, publisher = {mathdoc}, volume = {24}, number = {2}, year = {2017}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/MAIS_2017_24_2_a8/} }
TY - JOUR AU - V. M. Deundyak AU - Yu. V. Kosolapov AU - E. A. Lelyuk TI - Decoding the tensor product of $ \mathrm{MLD} $ codes and applications for code cryptosystems JO - Modelirovanie i analiz informacionnyh sistem PY - 2017 SP - 239 EP - 252 VL - 24 IS - 2 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/MAIS_2017_24_2_a8/ LA - ru ID - MAIS_2017_24_2_a8 ER -
%0 Journal Article %A V. M. Deundyak %A Yu. V. Kosolapov %A E. A. Lelyuk %T Decoding the tensor product of $ \mathrm{MLD} $ codes and applications for code cryptosystems %J Modelirovanie i analiz informacionnyh sistem %D 2017 %P 239-252 %V 24 %N 2 %I mathdoc %U http://geodesic.mathdoc.fr/item/MAIS_2017_24_2_a8/ %G ru %F MAIS_2017_24_2_a8
V. M. Deundyak; Yu. V. Kosolapov; E. A. Lelyuk. Decoding the tensor product of $ \mathrm{MLD} $ codes and applications for code cryptosystems. Modelirovanie i analiz informacionnyh sistem, Tome 24 (2017) no. 2, pp. 239-252. http://geodesic.mathdoc.fr/item/MAIS_2017_24_2_a8/
[1] Shor P. W., “Algorithms for quantum computation: Discrete logarithms and factoring”, Proceedings 35th Annual Symposium on Foundations of Computer Science, IEEE Computer Society Press, 1994, 124–134 | DOI | MR
[2] Sendrier N., Tillich J.-P., “Code-Based Cryptography: New Security Solutions Against a Quantum Adversary”, ERCIM News, 106, Special Theme Cybersecurity (2016) https://hal.archives-ouvertes.fr/hal-01410068
[3] McEliece R. J., A Public-Key Cryptosystem Based on Algebraic Coding Theory, JPL Deep Space Network Progress Report, No 42, 1978, 114–116
[4] Niederreiter H., “Knapsack-Type Cryptosystem and Algebraic Coding Theory”, Probl. Control and Inform. Theory, 15 (1986), 94–34 | MR
[5] Gabidulin E. M. et al., “Ideals Over a Non-Commutative Ring and Their Application in Cryptology”, Advances in Cryptology-EUROCRYPT'91, Lect. Notes in Comp. Sci., 547, ed. D. W. Davies, Springer-Verlag, 1991, 482–489 | DOI | MR
[6] Sidel'nikov V. M., “Open coding based on Reed–Muller binary codes”, Diskr. Mat., 6:2 (1994), 3–20 (in Russian) | Zbl
[7] Sidel'nikov V. M., Shestakov S. O., “O sisteme shifrovanija, osnovannoj pa obobshhennyh kodah Rida–Solomona”, Diskr. Mat., 3:3 (1992), 57–63 (in Russian) | Zbl
[8] Deundyak V. M. et al., “Modifikatsiya kriptoanaliticheskogo algoritma Sidel'nikova–Shestakova dlya obobshchennykh kodov Rida-Solomona i ee programmnaya realizatsiya”, Izvestiya vysshikh uchebnykh zavedeniy. Severo-Kavkazskiy region. Tekhnicheskie nauki, 2006, no. 4, 15–20 (in Russian)
[9] Overbeck R., “Structural Attacks for Public Key Cryptosystems based on Gabidulin Codes”, Journal of Cryptology, 21:2 (2008), 280–301 | DOI | MR | Zbl
[10] Minder L., Shokrollahi A., “Cryptanalysis of the Sidelnikov cryptosystem”, Lecture Notes in Computer Science, 4515, 2007, 347–360 | DOI | MR | Zbl
[11] Chizhov I. I., Borodin M. A., “Jeffektivnaja ataka na kriptosistemu Mak-Jelisa, postroennuju na osnove kodov Rida–Mallera”, Diskr. Mat., 26:1 (2014), 10–20 (in Russian) | DOI | MR | Zbl
[12] Deundyak V. M., Kosolapov Yu. V., “Cryptosystem Based on Induced Group Codes”, Modeling and Analysis of Information Systems, 23:2 (2016), 137–152 (in Russian) | MR
[13] Deundyak V. M., Kosolapov Yu. V., “Algorithms for Majority Decoding of Group Codes”, Modeling and Analysis of Information Systems, 22:4 (2015), 464–482 (in Russian) | MR
[14] Tsimmerman K.-Kh., Metody teorii modulyarnykh predstavleniy v algebraicheskoy teorii kodirovaniya, MTsNMO, M., 2011 (in Russian)
[15] Curtis C. W., Reiner I., Representation Theory of Finite Groups and Associative Algebras, Intersclence Publishers, New York, 1962 | MR | Zbl
[16] Lenstra A. K., Verheul E. R., “Selecting Cryptographic Key Sizes”, Journal of Cryptology, 14 (2001), 255–293 | DOI | MR | Zbl