{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T19:53:49Z","timestamp":1776455629929,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642129285","type":"print"},{"value":"9783642129292","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12929-2_6","type":"book-chapter","created":{"date-parts":[[2010,5,31]],"date-time":"2010-05-31T05:17:53Z","timestamp":1275283073000},"page":"73-80","source":"Crossref","is-referenced-by-count":108,"title":["Grover vs.\u00a0McEliece"],"prefix":"10.1007","author":[{"given":"Daniel J.","family":"Bernstein","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Proceedings of the twenty-eighth annual ACM symposium on the theory of computing, held in Philadelphia, PA, May 22-24. Association for Computing Machinery (1996), ISBN 0-89791-785-5. MR 97g:68005. See [13]"},{"key":"#cr-split#-6_CR2.1","unstructured":"Barg, A., Zhou, S.: A quantum decoding algorithm of the simplex code. In: Proceedings of the 36th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, September 23-25 (1998), http:\/\/www.enee.umd.edu\/~abarg\/reprints\/rm1dq.pdf;"},{"key":"#cr-split#-6_CR2.2","unstructured":"Citations in this document: ??2"},{"key":"#cr-split#-6_CR3.1","unstructured":"Bernstein, D.J.: Cost analysis of hash collisions: Will quantum computers make SHARCS obsolete? In: Workshop Record of SHARCS ???09: Special-purpose Hardware for Attacking Cryptographic Systems (2009), http:\/\/cr.yp.to\/papers.html#collisioncost;"},{"key":"#cr-split#-6_CR3.2","unstructured":"Citations in this document: ??1"},{"key":"6_CR4","volume-title":"Post-quantum cryptography","year":"2009","unstructured":"Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.): Post-quantum cryptography. Springer, Heidelberg (2009), ISBN 978\u20133\u2013540\u201388701\u20130.See [16], [20]"},{"key":"#cr-split#-6_CR5.1","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Lange, T., Peters, C.: Attacking and defending the McEliece cryptosystem. In: [9], pp. 31???46 (2008), http:\/\/eprint.iacr.org\/2008\/318;","DOI":"10.1007\/978-3-540-88403-3_3"},{"key":"#cr-split#-6_CR5.2","unstructured":"Citations in this document: ??2, ??2"},{"key":"#cr-split#-6_CR6.1","unstructured":"Bernstein, D.J., Lange, T., Peters, C., van Tilborg, H.: Explicit bounds for generic decoding algorithms for code-based cryptography. In: WCC 2009 (2009);"},{"key":"#cr-split#-6_CR6.2","unstructured":"Citations in this document: ??1, ??2, ??2, ??3"},{"key":"#cr-split#-6_CR7.1","unstructured":"Boyer, M., Brassard, G., H??yer, P., Tapp, A.: Tight bounds on quantum searching (1996), http:\/\/arxiv.org\/abs\/quant-ph\/9605034v1;"},{"key":"#cr-split#-6_CR7.2","unstructured":"Citations in this document: ??3, ??3"},{"key":"#cr-split#-6_CR8.1","doi-asserted-by":"crossref","unstructured":"Brassard, G., H??yer, P., Tapp, A.: Quantum cryptanalysis of hash and claw- free functions. In: [18], pp. 163???169 (1998);","DOI":"10.1007\/BFb0054319"},{"key":"#cr-split#-6_CR8.2","unstructured":"MR 99g:94013. Citations in this document: ??1"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"Post-Quantum Cryptography","year":"2008","unstructured":"Buchmann, J., Ding, J. (eds.): PQCrypto 2008. LNCS, vol.\u00a05299. Springer, Heidelberg (2008); See [5]"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"Coding Theory and Applications","year":"1989","unstructured":"Cohen, G.D., Wolfmann, J. (eds.): Coding Theory 1988. LNCS, vol.\u00a0388. Springer, Heidelberg (1989)"},{"key":"6_CR11","unstructured":"Gilbert, E.N., MacWilliams, F.J., Sloane, N.J.A.: Codes which detect deception. Bell System Technical Journal\u00a053, 405\u2013424 (1974), ISSN 0005\u20138580. MR 55:5306, http:\/\/cr.yp.to\/bib\/entries.html#1974\/gilbert . Citations in this document: \u00a71"},{"key":"6_CR12","unstructured":"Goldwasser, S. (ed.): 35th annual IEEE symposium on the foundations of computer science. Proceedings of the IEEE symposium held in Santa Fe, NM, November 20-22. IEEE, Los Alamitos (1994), ISBN 0-8186-6580-7. MR 98h:68008. See [21]"},{"key":"#cr-split#-6_CR13.1","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: [1], pp. 212???219 (1996);","DOI":"10.1145\/237814.237866"},{"key":"#cr-split#-6_CR13.2","unstructured":"MR 1427516. Citations in this document: ??1"},{"key":"6_CR14","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1103\/PhysRevLett.79.325","volume":"79","author":"L.K. Grover","year":"1997","unstructured":"Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Physical Review Letters\u00a079, 325\u2013328 (1997); Citations in this document: \u00a71","journal-title":"Physical Review Letters"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - EUROCRYPT \u201988","year":"1988","unstructured":"G\u00fcnther, C.G. (ed.): EUROCRYPT 1988. LNCS, vol.\u00a0330. Springer, Heidelberg (1988), ISBN 3\u2013540\u201350251\u20133. MR 90a:94002. See [17]"},{"key":"#cr-split#-6_CR16.1","doi-asserted-by":"crossref","unstructured":"Hallgren, S., Vollmer, U.: Quantum computing. In: [4], pp. 15???34 (2009);","DOI":"10.1007\/978-3-540-88702-7_2"},{"key":"#cr-split#-6_CR16.2","unstructured":"Citations in this document: ??1"},{"key":"#cr-split#-6_CR17.1","doi-asserted-by":"crossref","unstructured":"Lee, P.J., Brickell, E.F.: An observation on the security of McEliece???s public-key cryptosystem. In: [15], pp. 275???280 (1988);","DOI":"10.1007\/3-540-45961-8_25"},{"key":"#cr-split#-6_CR17.2","unstructured":"Citations in this document: ??3"},{"key":"6_CR18","series-title":"Lecture Notes in Computer Science","volume-title":"LATIN\u201998: Theoretical Informatics","year":"1998","unstructured":"Lucchesi, C.L., Moura, A.V. (eds.): LATIN 1998. LNCS, vol.\u00a01380. Springer, Heidelberg (1998), ISBN 3-540-64275-7. MR 99d:68007. See [8]"},{"key":"#cr-split#-6_CR19.1","unstructured":"McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. JPL DSN Progress Report, 114???116 (1978), http:\/\/ipnpr.jpl.nasa.gov\/progress_report2\/42-44\/44N.PDF;"},{"key":"#cr-split#-6_CR19.2","unstructured":"Citations in this document: ??1"},{"key":"#cr-split#-6_CR20.1","doi-asserted-by":"crossref","unstructured":"Overbeck, R., Sendrier, N.: Code-based cryptography. In: [4], pp. 95???145 (2009);","DOI":"10.1007\/978-3-540-88702-7_4"},{"key":"#cr-split#-6_CR20.2","unstructured":"Citations in this document: ??1, ??1, ??2, ??3, ??3"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: [12], pp. 124\u2013134 (1994), see also newer version [22]. MR 1489242. Citations in this document: \u00a71","DOI":"10.1109\/SFCS.1994.365700"},{"key":"6_CR22","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P.W. Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing\u00a026, 1484\u20131509 (1997), see also older version [21]. MR 98i:11108","journal-title":"SIAM Journal on Computing"},{"key":"#cr-split#-6_CR23.1","doi-asserted-by":"crossref","unstructured":"Stern, J.: A method for finding codewords of small weight. In: [10], pp. 106???113 (1989);","DOI":"10.1007\/BFb0019850"},{"key":"#cr-split#-6_CR23.2","unstructured":"Citations in this document: ??2, ??3"},{"key":"#cr-split#-6_CR24.1","unstructured":"Zalka, C.: Fast versions of Shor???s quantum factoring algorithm (1998), http:\/\/arxiv.org\/abs\/quant-ph\/9806084;"},{"key":"#cr-split#-6_CR24.2","unstructured":"Citations in this document: ??1"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12929-2_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T16:19:33Z","timestamp":1635437973000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12929-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642129285","9783642129292"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12929-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}