{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T02:04:57Z","timestamp":1725761097548},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319035147"},{"type":"electronic","value":"9783319035154"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-03515-4_19","type":"book-chapter","created":{"date-parts":[[2013,12,2]],"date-time":"2013-12-02T05:20:12Z","timestamp":1385961612000},"page":"286-296","source":"Crossref","is-referenced-by-count":1,"title":["Polynomial Structures in Code-Based Cryptography"],"prefix":"10.1007","author":[{"given":"Vlad","family":"Dragoi","sequence":"first","affiliation":[]},{"given":"Pierre-Louis","family":"Cayrel","sequence":"additional","affiliation":[]},{"given":"Brice","family":"Colombier","sequence":"additional","affiliation":[]},{"given":"Tania","family":"Richmond","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Avanzi, R., Hoerder, S., Page, D., Tunstall, M.: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems. In: Cryptology ePrint Archive, Report 2010\/479 (2010)"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Buchmann, J., Dahmen, E.: Post-Quantum Cryptography. Springer (2009)","DOI":"10.1007\/978-3-540-88702-7"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Chou, T., Schwabe, P.: McBits: fast constant-time code-based cryptography, 0616 (2013)","DOI":"10.1007\/978-3-642-40349-1_15"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-19574-7_10","volume-title":"Selected Areas in Cryptography","author":"D.J. Bernstein","year":"2011","unstructured":"Bernstein, D.J., Lange, T., Peters, C.: Wild MCEliece. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol.\u00a06544, pp. 143\u2013158. Springer, Heidelberg (2011)"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-642-25405-5_16","volume-title":"Post-Quantum Cryptography","author":"D.J. Bernstein","year":"2011","unstructured":"Bernstein, D.J., Lange, T., Peters, C.: Wild MCEliece incognito. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol.\u00a07071, pp. 244\u2013254. Springer, Heidelberg (2011)"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-88403-3_4","volume-title":"Post-Quantum Cryptography","author":"B. Biswas","year":"2008","unstructured":"Biswas, B., Sendrier, N.: McEliece cryptosystem implementation: Theory and practice. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol.\u00a05299, pp. 47\u201362. Springer, Heidelberg (2008)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-642-30057-8_9","volume-title":"Public Key Cryptography \u2013 PKC 2012","author":"P.-L. Cayrel","year":"2012","unstructured":"Cayrel, P.-L., Hoffmann, G., Persichetti, E.: Efficient implementation of a CCA2-secure variant of MCEliece using generalized Srivastava codes. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol.\u00a07293, pp. 138\u2013155. Springer, Heidelberg (2012)"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/3-540-45682-1_10","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"N.T. Courtois","year":"2001","unstructured":"Courtois, N.T., Finiasz, M., Sendrier, N.: How to achieve a MCEliece-based digital signature scheme. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 157\u2013174. Springer, Heidelberg (2001)"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-04138-9_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"T. Eisenbarth","year":"2009","unstructured":"Eisenbarth, T., G\u00fcneysu, T., Heyse, S., Paar, C.: MicroEliece: McEliece for embedded devices. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 49\u201364. Springer, Heidelberg (2009)"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-25405-5_10","volume-title":"Post-Quantum Cryptography","author":"S. Heyse","year":"2011","unstructured":"Heyse, S.: Implementation of McEliece based on Quasi-dyadic Goppa Codes for Embedded Devices. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol.\u00a07071, pp. 143\u2013162. Springer, Heidelberg (2011)"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-642-12929-2_13","volume-title":"Post-Quantum Cryptography","author":"S. Heyse","year":"2010","unstructured":"Heyse, S.: Low-reiter: Niederreiter encryption scheme for embedded microcontrollers. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol.\u00a06061, pp. 165\u2013181. Springer, Heidelberg (2010)"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Heyse, S., von Maurich, I., Guneysu, T.: Smaller Keys for Code-based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices (2013)","DOI":"10.7873\/DATE2014.051"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Landais, G., Sendrier, N.: CFS Software Implementation. Indocrypt 2012 and Cryptology ePrint Archive, Report 2012\/132 (2012)","DOI":"10.1007\/978-3-642-34931-7_27"},{"issue":"1","key":"19_CR14","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"IT-15","author":"J.L. Massey","year":"1969","unstructured":"Massey, J.L.: Shift-register synthesis and bch decoding. Transactions on Information Theory\u00a0IT-15(1), 122\u2013127 (1969)","journal-title":"Transactions on Information Theory"},{"key":"19_CR15","unstructured":"McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. In: Jet Propulsion Laboratory DSN Progress Report 42-44, pp. 114\u2013116 (1978)"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Misoczki, R., Tillich, J.-P., Sendrier, N., Barreto, P.S.L.M.: Mdpc-McEliece: New McEliece variants from moderate density parity-check codes. In: Cryptology ePrint Archive, Report 2012\/409 (2012)","DOI":"10.1109\/ISIT.2013.6620590"},{"key":"19_CR17","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/TIT.1975.1055350","volume":"21","author":"N.J. Patterson","year":"1975","unstructured":"Patterson, N.J.: The algebraic decoding of goppa codes. IEEE Transactions on Information Theory IT-21, 203\u2013207 (1975)","journal-title":"IEEE Transactions on Information Theory IT-"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer (1994)","DOI":"10.1007\/3-540-58691-1_68"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-14423-3_12","volume-title":"Information, Security and Cryptology \u2013 ICISC 2009","author":"A. Shoufan","year":"2010","unstructured":"Shoufan, A., Strenzke, F., Molter, H.G., St\u00f6ttinger, M.: A Timing Attack against Patterson Algorithm in the McEliece PKC. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol.\u00a05984, pp. 161\u2013175. Springer, Heidelberg (2010)"},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-642-12929-2_8","volume-title":"Post-Quantum Cryptography","author":"F. Strenzke","year":"2010","unstructured":"Strenzke, F.: A Timing Attack against the Secret Permutation in the McEliece PKC. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol.\u00a06061, pp. 95\u2013107. Springer, Heidelberg (2010)"},{"key":"19_CR21","unstructured":"Strenzke, F.: Timing attacks against the syndrome inversion in code-based cryptosystems. In: Cryptology ePrint Archive, Report 2011\/683 (2011)"},{"key":"19_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-540-88403-3_15","volume-title":"Post-Quantum Cryptography","author":"F. Strenzke","year":"2008","unstructured":"Strenzke, F., Tews, E., Molter, H.G., Overbeck, R., Shoufan, A.: Side channels in the mcEliece PKC. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol.\u00a05299, pp. 216\u2013229. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 INDOCRYPT 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-03515-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T01:54:58Z","timestamp":1558749298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-03515-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319035147","9783319035154"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-03515-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}