[1] BERLEKAMP E R, MCELIECE R J, van TIBORG H C A. On the inherent intractability of certain coding problems[J]. IEEE Transactions on Information Theory, 1978, 24(3):384-386. [2] MCELIECE R J. A public-key cryptosystem based on algebraic coding theory[J]. Deep Space Network Progress Report, 1978, 42/43/44:114-116. [3] NIEDERREITER H. Knapsack-type cryptosystems and algebraic coding theory[J]. Problems of Control and Information Theory, 1986, 15(2):159-166 [4] 李冲,韩益亮.基于QC-LDPC码的双公钥Niederreiter密码方案[J].计算机应用研究,2016,33(11):3446-3449,3454.(LI C, HAN Y L. Dual-key Niederreiter cryptosystem based on QC-LDPC codes[J]. Application Research of Computers, 2016, 33(11):3446-3449, 3454.) [5] YOSHIDA Y, MOROZOV K, TANAKA K. CCA2 key-privacy for code-based encryption in the standard model[C]//Proceedings of the 2017 International Workshop on Post-Quantum Cryptography, LNCS 10346. Cham:Springer, 2017:35-50. [6] DENEUVILLE J C, GABORIT P, ZEMOR G. Ouroboros:a simple, secure and efficient key exchange protocol based on coding theory[C]//Proceedings of the 2017 International Workshop on Post-Quantum Cryptography, LNCS 10346. Cham:Springer, 2017:18-34. [7] PERSICHETTI E. Secure and anonymous hybrid encryption from coding theory[C]//Proceedings of the 2013 International Workshop on Post-Quantum Cryptography, LNCS 7932. Berlin:Springer, 2013:174-187. [8] von MAURICH I, HEBERLE L, GUNEYSU T. IND-CCA secure hybrid encryption from QC-MDPC Niederreiter[C]//Proceedings of the 2016 International Workshop on Post-Quantum Cryptography, LNCS 9606. Cham:Springer, 2016:1-17. [9] PRANGE E. The use of information sets in decoding cyclic codes[J]. IRE Transactions on Information Theory, 1962, 8(5):5-9. [10] STERN J. A method for finding codewords of small weight[C]//Proceedings of the 1988 International Colloquium on Coding Theory and Applications, LNCS 388. Berlin:Springer, 1988:106-113. [11] BECKER A, JOUX A, MAY A, et al. Decoding random binary linear codes in 2n/20:how 1+1=0 improves information set decoding[C]//Proceedings of the 2012 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 7237. Berlin:Springer, 2012:520-536. [12] MAY A, OZEROV I. On computing nearest neighbors with applications to decoding of binary linear codes[C]//Proceedings of the 2015 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 9056. Berlin:Springer, 2015:203-228. [13] 李梦东,蔡坤锦,邵玉芳.信息集攻击算法的改进[J].密码学报,2016,3(5):505-515.(LI M D, CAI K J, SHAO Y F. An improved algorithm of information set decoding[J]. Journal of Cryptologic Research, 2016, 3(5):505-515.) [14] TORRES R C, SENDRIER N. Analysis of information set decoding for a sub-linear error weight[C]//Proceedings of the 2016 International Workshop on Post-Quantum Cryptography, LNCS 9606. Cham:Springer, 2016:144-161. [15] KACHIGAR G, TILLICH J P. Quantum information set decoding algorithms[C]//Proceedings of the 2017 International Workshop on Post-Quantum Cryptography, LNCS 10346. Cham:Springer, 2017:69-89. |