Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2023_1_a2, author = {K. D. Tsaregorodtsev}, title = {Ternary forking lemma and its application to~the~analysis of one code-based signature}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {58--71}, publisher = {mathdoc}, number = {1}, year = {2023}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2023_1_a2/} }
K. D. Tsaregorodtsev. Ternary forking lemma and its application to~the~analysis of one code-based signature. Prikladnaâ diskretnaâ matematika, no. 1 (2023), pp. 58-71. http://geodesic.mathdoc.fr/item/PDM_2023_1_a2/
[1] Pointcheval D. and Stern J., “Security proofs for signature schemes”, EUROCRYPT'96, LNCS, 1070, 1996, 387–398 | MR
[2] Damgård I., On $\Sigma$-protocols, Lecture Notes, University of Aarhus, Department of Computer Science, 2002
[3] Fiat A. and Shamir A., “How to prove yourself: Practical solutions to identification and signature problems”, LNCS, 263, 1987, 186–194 | MR
[4] Cheremushkin A. V., “Cryptographic protocols: main properties and vulnerabilities”, Prikladnaya Diskretnaya Matematika. Prilozhenie, 2009, no. 2, 115–150 (in Russian)
[5] Bellare M. and Neven G., “Multi-signatures in the plain public-key model and a general forking lemma”, Proc. 13th ACM Conf. CCM'06, 2006, 390–399
[6] Vysotskaya V. V. and Chizhov I. V., “The security of the code-based signature scheme based on the Stern identification protocol”, Prikladnaya Diskretnaya Matematika, 57 (2022), 67–90 | MR
[7] Stern J., “A new identification scheme based on syndrome decoding”, LNCS, 773, 1993, 13–21
[8] Katz J. and Lindell Y., Introduction to Modern Cryptography, 3d Ed., Chapman Hall/CRC Cryptography and Network Security Series, 2021, 628 pp. | MR
[9] Berlekamp E., McEliece R., and Van Tilborg H., “On the inherent intractability of certain coding problems”, IEEE Trans. Inform. Theory, 24:3 (1978), 384–386 | DOI | MR
[10] Bellare M. and Rogaway P., “Random oracles are practical: A paradigm for designing efficient protocols”, Proc. 1st ACM Conf. CCS'93, 1993, 62–73
[11] Fischlin M., Lehmann A., Ristenpart T., et al., “Random oracles with (out) programmability”, LNCS, 6477, 2010, 303–320 | MR
[12] Shoup V., Sequences of Games: a Tool for Taming Complexity in Security Proofs, Cryptology Archive, Paper 2004/332, 2004
[13] Esser A. and Bellini E., Syndrome Decoding Estimator, Cryptology Archive, Paper 2021/1243, 2021 | MR
[14] Syndrome Decoding Estimator, , 2021 https://github.com/Crypto-TII/syndrome_decoding_estimator