Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(124.87KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
On the Usage of Chained Codes in Cryptography
Omessaad Hamdi, Ammar Bouallegue, Sami Harari
Pages - 482 - 490     |    Revised - 30-12-2009     |    Published - 31-01-2010
Published in International Journal of Computer Science and Security (IJCSS)
Volume - 3   Issue - 6    |    Publication Date - January 2010  Table of Contents
MORE INFORMATION
References   |   Abstracting & Indexing
KEYWORDS
Cryptography, Chained Codes, Attack,, Complexity
ABSTRACT
We discuss the chained randomized linear code and their use in cryptography. We show that the adoption of randomized chained codes in the framework of McEliece cryptosystem expose the cryptosystem to some new attacks.
ABSTRACTING & INDEXING
1 Google Scholar 
2 Academic Journals Database 
3 ScientificCommons 
4 CiteSeerX 
5 iSEEK 
6 Socol@r  
7 ResearchGATE 
8 Libsearch 
9 Bielefeld Academic Search Engine (BASE) 
10 Scribd 
11 WorldCat 
12 SlideShare 
13 PDFCAST 
14 PdfSR 
15 Chinese Directory Of Open Access 
REFERENCES
A. Canteaut "Attaques de cryptosystemes a mots de poids faible et construction de fonctions t-resilientes" . PhD thesis, Universite Paris 6, October 1996.
A. Otmani, J. P. Tillich, and L. Dallot. Cryptanalysis of two McEliece cryptosystems based on quasi- cyclic codes. In Proc. First International Conference on Symbolic Computation and Cryptography (SCC 2008), Beijing, China, April 2008.
D. J. Bernstein, T. Lange, and C. Peters. Attacking and defending the McEliece cryptosystem. In Post- Quantum Cryptography, volume 5299 of Lecture Notes in Computer Science, pages 31-46. Springer Berlin Heidelberg, 2008.
E.R. Berlekamp, R.J. McEliece, and H.C.A. van Tilborg, "On the inherent intractability of certain coding problems", IEEE Transactions on Information Theory, Vol.24, No.3,1978, pp.384-386.
M. Baldi and F. Chiaraluce. Cryptanalysis of a new instance of McEliece cryptosystem based on QC- LDPC codes. In Proc. IEEE International Symposium on Information Theory (ISIT 2007), pages 2591-2595, Nice, France, June 2007.
N. Courtois, M. Finiasz, and N. Sendrier, "How to achieve a McEliece-based digital signature scheme", In C. Boyd, editor, Asiacrypt 2001, volume 2248 of LNCS, pages 157-174. Springer- Verlag, 2001.
N.Sendrier, "On the structure of a linear code". AAECC, Vol.9, n3, 1998, pp.221-242.
O. Hamdi, A. Bouallegue, S.Harari, Weakness on Cryptographic Schemes based on Chained Codes, The First International Workshop on Wireless and Mobile Networks Security (WMNS-2009) in conjunction with NSS 2009, October 19 21 2009, Gold Coast, Australia.
R. Heiman "On the security of Cryptosystems Based on Linear Error Correcting codes" MSc. Thesis, Feinberg Graduate School of the Weizmann Institute of Science. August 1987.
R.J. McEliece, "A public-key cryptosystem based on algebraic coding theory"; DSN Prog. Rep., Jet Propulsion Laboratory, California Inst. Technol., Pasadena, CA, pp. 114- 116,January 1978.
MANUSCRIPT AUTHORS
Associate Professor Omessaad Hamdi
- France
hamdi@univ-tln.fr
Mr. Ammar Bouallegue
- France
Mr. Sami Harari
- France


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions