[1] RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978, 21(2):120-126.
[2] McELIECE R J. A public-key cryptosystem based on algebraic coding theory[J]. DSN Progress Report, 1978, 42(44):114-116.
[3] NIEDERREITER H. Knapsack-type cryptosystems and algebraic coding theory[J]. Problems of Control and Information Theory, 1986, 15(2):159-166.
[4] 刘相信,杨晓元.Niederreiter公钥密码方案的改进[J].计算机应用,2018,38(7):1956-1959.(LIU X X, YANG X Y. Improvement of the Niederreiter public key system[J]. Journal of Computer Applications, 2018, 38(7):1956-1959.)
[5] 张俊.编码的构造与译码问题及其在密码学中的应用[D].天津:南开大学,2014:23-39.(ZHANG J. The problem of coding construction and decoding and its application in cryptography[D]. Tianjin:Nankai University, 2014:23-39.)
[6] 李泽慧,杨亚涛,李子臣.基于QC-MDPC码的公钥密码方案设计[J].计算机应用研究,2015,32(3):881-884.(LI Z H, YANG Y T, LI Z C. Design of public key cryptography based on QC-MDPC code[J]. Application Research of Computers, 2015, 32(3):881-884.)
[7] 曹东,赵生妹,宋耀良.一种基于量子准循环LDPC码的McEliece公钥密码算法[J].南京邮电大学学报(自然科学版),2011,31(2):64-68.(CAO D, ZHAO S M, SONG Y L. A McEliece public key cryptography algorithm based on quantum quasi-cyclic LDPC Code[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), 2011, 31(2):64-68.)
[8] 王延丽.基于QC-LDPC码的McEliece公钥密码体制研究[D].西安:西安电子科技大学,2013:1-5.(WANG Y L. Research on McEliece public key cryptosystem based on QC-LDPC code[D]. Xi'an:Xidian University, 2013:1-5.)
[9] 张颖,岳殿武.基于代数几何码的公钥密码体制[J].通信学报,2008,29(6):75-81.(ZHANG Y, YUE D W. Public key cryptosystem based on algebraic geometry codes[J]. Journal on Communications, 2008, 29(6):75-81.)
[10] 李冲,韩益亮.基于QC-LDPC码的双公钥Niederreiter密码方案[J].计算机应用研究,2016,33(11):3446-3449.(LI C, HAN Y L. Double public key Niederreiter cryptography scheme based on QC-LDPC code[J]. Application Research of Computers, 2016, 33(11):3446-3449.)
[11] 范武英,任方.基于校验子译码问题的伪随机序列研究综述[J].西安邮电大学学报,2017,22(2):1-6.(FAN W Y, REN F. Review of pseudo-random sequence based on syndrome decoding problem[J]. Journal of Xi'an University of Posts and Telecommunications, 2017, 22(2):1-6.)
[12] 李元兴,王新梅.关于代数码Niederreiter公钥密码体制的安全性及参数优化[J].电子学报,1993,21(7):33-36.(LI Y X, WANG X M. On the security and parameter optimization of algebraic Niederreiter public key cryptography[J]. Acta Electronica Sinica, 1993, 21(7):33-36.)
[13] PRANGE E. The use of information sets in decoding cyclic codes[J]. IRE Transactions on Information Theory, 1962, 8(5):5-9.
[14] MAY A, OZEROV I. On computing nearest neighbors with applications to decoding of binary linear codes[C]//EUROCRYPT 2015:Proceedings of the 2015 Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2015:203-228.
[15] 李梦东,蔡坤锦,邵玉芳.信息集攻击算法的改进[J].密码学报,2016,3(5):505-515.(LI M D, CAI K J, SHAO Y F. An improved algorithm of information set decoding[J]. Journal of Cryptologic Research, 2016, 3(5):505-515.)
[16] TORRES R C, SENDRIER N. Analysis of information set decoding for a sub-linear error weight[C]//PQCrypto2016:Proceedings of the 2016 International Workshop on Post-Quantum Cryptography. Berlin:Springer, 2016:144-161.
[17] KACHIGAR G, TILLICH J P. Quantum information set decoding algorithms[C]//PQCrypto 2017:Proceedings of the 2017 International Workshop on Post-Quantum Cryptography. Berlin:Springer, 2017:69-89.
[18] 杨磊鑫,杜伟章.利用双公钥的Niederreiter公钥密码体制的改进[J].长沙理工大学学报(自然科学版),2010,7(4):74-77.(YANG L X, DU W Z. Improvement of Niederreiter public key cryptosystem using double public key[J]. Journal of Changsha University of Science and Technology (Natural Science), 2010, 7(4):74-77.) |