[1] BERLEKAMP E R, MCELIECE R J, van TIBORG H C A. On the inherent intractability of certain coding problems[J]. IEEE Transactions on Information Theory, 1978, 24(3):384-386. [2] MCELIECE R J. A public-key cryptosystem based on algebraic coding theory[J]. DSN Progress Report, 1978, 42(44):114-116. [3] NIEDERREITER H. Knapsack-type cryptosystems and algebraic coding theory[J]. Problems of Control and Information Theory, 1986, 15(2):159-166. [4] FABSIC T, GALLO O, HROMADA V. Simple power analysis attack on the QC-LDPC McEliece cryptosystem[J]. Tatra Mountains Mathematical Publications, 2016, 67(1):85-92. [5] GUO Q, JOHANSSON T, STANKOVSKI P. A key recovery attack on MDPC with CCA security using decoding errors[C]//ASIACRYPT 2016:Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2016:789-815. [6] SHOOSHTARI M K, AHMADIAN-ATTARI M, JOHANSSON T, et al. Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes[J]. IET Information Security, 2016, 10(4):194-202. [7] FABSIC T, HROMADA V, STANKOVSKI P, et al. A reaction attack on the QC-LDPC McEliece cryptosystem[C]//PQCrypto 2017:Proceedings of the 2017 International Workshop on Post-Quantum Cryptography. Berlin:Springer, 2017:51-68. [8] FAUGERE J, OTMANI A, PERRET L, et al. Structural cryptanalysis of McEliece schemes with compact keys[J]. Designs, Codes and Cryptography, 2016, 79(1):87-112. [9] FAUGERE J C, PERRET L, PORTZAMPARC F D. Algebraic attack against variants of McEliece with Goppa polynomial of a special form[C]//ASIACRYPT 2014:Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2014:21-41. [10] COUVREUR A, OTMANI A, TILLICH J. Polynomial time attack on wild McEliece over quadratic extensions[C]//EUROCRYPT 2014:Proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2014:17-39. [11] COUVREUR A, GABORIT P, OTMANI A, et al. Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes[J]. Designs Codes & Cryptography, 2014, 73(2):641-666. [12] PRANGE E. The use of information sets in decoding cyclic codes[J]. IRE Transactions on Information Theory, 1962, 8(5):5-9. [13] 李元兴,王新梅.关于Niederreiter代数码公钥密码体制的安全性及参数优化[J].电子学报,1993,21(7):33-36.(LI Y X, WANG X M. On the security of the Niederreiter's publickey algebraic-code cryptosystem and the optimization of parameters[J]. Acta Electronica Sinica, 1993, 21(7):33-36.) [14] MAY A, OZEROV I. On computing nearest neighbors with applications to decoding of binary linear codes[C]//EUROCRYPT 2015:Proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2015:203-228. [15] 李梦东,蔡坤锦,邵玉芳.信息集攻击算法的改进[J].密码学报,2016,3(5):505-515.(LI M D, CAI K J, SHAO Y F. An improved algorithm of information set decoding[J]. Journal of Cryptologic Research, 2016, 3(5):505-515.) [16] TORRES R C, SENDRIER N. Analysis of information set decoding for a sub-linear error weight[C]//PQCrypto 2016:Proceedings of the 2016 International Workshop on Post-Quantum Cryptography. Berlin:Springer, 2016:144-161. [17] KACHIGAR G, TILLICH J P. Quantum information set decoding algorithms[C]//PQCrypto 2017:Proceedings of the 2017 International Workshop on Post-Quantum Cryptography. Berlin:Springer, 2017:69-89. [18] BALDI M, BIANCHI M, CHIARALUCE F, et al. Enhanced public key security for the McEliece cryptosystem[J]. Journal of Cryptology, 2016, 29(1):1-27. [19] FAUGERE J C, GAUTHIER-UMANA V, OTMANI A, et al. A distinguisher for high rate McEliece cryptosystems[C]//ITW 2011:Proceedings of the 2011 Information Theory Workshop. Piscataway, NJ:IEEE, 2011:6830-6844. |