{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:47:28Z","timestamp":1742971648882,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642209000"},{"type":"electronic","value":"9783642209017"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20901-7_5","type":"book-chapter","created":{"date-parts":[[2011,6,4]],"date-time":"2011-06-04T10:11:30Z","timestamp":1307182290000},"page":"81-98","source":"Crossref","is-referenced-by-count":10,"title":["Faster 2-Regular Information-Set Decoding"],"prefix":"10.1007","author":[{"given":"Daniel J.","family":"Bernstein","sequence":"first","affiliation":[]},{"given":"Tanja","family":"Lange","sequence":"additional","affiliation":[]},{"given":"Christiane","family":"Peters","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Schwabe","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Augot, D., Finiasz, M., Gaborit, P., Manuel, S., Sendrier, N.: SHA-3 proposal: FSB (2008), \n                  \n                    http:\/\/www-rocq.inria.fr\/secret\/CBCrypto\/fsbdoc.pdf\n                  \n                  \n                , Citations in this document: \u00a71, \u00a71, \u00a71, \u00a75, \u00a75, \u00a75, \u00a75"},{"key":"5_CR2","unstructured":"Augot, D., Finiasz, M., Sendrier, N.: A fast provably secure cryptographic hash function (2003), \n                  \n                    http:\/\/eprint.iacr.org\/2003\/230\n                  \n                  \n                , Citations in this document: \u00a71, \u00a71, \u00a71, \u00a72, \u00a73, \u00a73, \u00a73, \u00a73, \u00a73, \u00a73, \u00a74"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Augot, D., Finiasz, M., Sendrier, N.: A family of fast syndrome based cryptographic hash functions. In: Mycrypt 2005 [13], pp. 64\u201383 (2005), Citations in this document: \u00a71, \u00a71, \u00a73","DOI":"10.1007\/11554868_6"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Lange, T., Niederhagen, R., Peters, C., Schwabe, P.: FSBday: implementing Wagner\u2019s generalized birthday attack against the SHA-3 round-1 candidate FSB. In: Indocrypt 2009 [23], pp. 18\u201338 (2009), \n                  \n                    http:\/\/eprint.iacr.org\/2009\/292\n                  \n                  \n                , Citations in this document: \u00a71","DOI":"10.1007\/978-3-642-10628-6_2"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Lange, T., Peters, C.: Attacking and defending the McEliece cryptosystem. In: PQCrypto 2008 [9], pp. 31\u201346 (2008), \n                  \n                    http:\/\/eprint.iacr.org\/2008\/318\n                  \n                  \n                , Citations in this document: \u00a72, \u00a74, \u00a74","DOI":"10.1007\/978-3-540-88403-3_3"},{"key":"5_CR6","unstructured":"Bernstein, D.J., Lange, T., Peters, C.: Ball-collision decoding (2010), \n                  \n                    http:\/\/eprint.iacr.org\/2010\/585\n                  \n                  \n                , Citations in this document: \u00a72, \u00a74"},{"key":"5_CR7","unstructured":"Bernstein, D.J., Lange, T., Peters, C., Schwabe, P.: Really fast syndrome-based hashing (2011), \n                  \n                    http:\/\/eprint.iacr.org\/2011\/074\n                  \n                  \n                , Citations in this document: \u00a71, \u00a71, \u00a75"},{"key":"5_CR8","unstructured":"Bernstein, D.J., Lange, T., Peters, C., van Tilborg, H.: Explicit bounds for generic decoding algorithms for code-based cryptography. In: WCC 2009, pp. 168\u2013180 (2009), Citations in this document: \u00a74"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"Post-Quantum Cryptography","year":"2008","unstructured":"Buchmann, J., Ding, J. (eds.): PQCrypto 2008. LNCS, vol.\u00a05299. Springer, Heidelberg (2008) See [5], [14]"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/18.651067","volume":"44","author":"A. Canteaut","year":"1998","unstructured":"Canteaut, A., Chabaud, F.: A new algorithm for finding minimum-weight words in a linear code: application to McEliece\u2019s cryptosystem and to narrow-sense BCH codes of length 511. IEEE Transactions on Information Theory\u00a044, 367\u2013378 (1998), \n                  \n                    ftp:\/\/ftp.inria.fr\/INRIA\/tech-reports\/RR\/RR-2685.ps.gz\n                  \n                  \n                , MR 98m:94043, Citations in this document: \u00a74","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Carleial, A.B., Hellman, M.E.: A note on Wyner\u2019s wiretap channel. IEEE Transactions on Information Theory\u00a023, 387\u2013390 (1977), ISSN 0018-9448, Citations in this document: \u00a74","DOI":"10.1109\/TIT.1977.1055721"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Coding Theory and Applications","year":"1989","unstructured":"Wolfmann, J., Cohen, G. (eds.): Coding Theory 1988. LNCS, vol.\u00a0388. Springer, Heidelberg (1989), See [24]"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","volume-title":"Progress in Cryptology \u2013 Mycrypt 2005","year":"2005","unstructured":"Dawson, E., Vaudenay, S. (eds.): Mycrypt 2005. LNCS, vol.\u00a03715. Springer, Heidelberg (2005), See [3]"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Finiasz, M.: Syndrome based collision resistant hashing. In: PQCrypto 2008 [9], pp. 137\u2013147 (2008), Citations in this document: \u00a71","DOI":"10.1007\/978-3-540-88403-3_10"},{"key":"5_CR15","unstructured":"Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: Proceedings of ECRYPT Hash Workshop 2007 (2007), \n                  \n                    http:\/\/www-roc.inria.fr\/secret\/Matthieu.Finiasz\/research\/2007\/finiasz-gaborit-sendrier-ecrypt-hash-workshop07.pdf\n                  \n                  \n                , Citations in this document: \u00a71, \u00a71"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Finiasz, M., Sendrier, N.: Security bounds for the design of code-based cryptosystems. In: Asiacrypt 2009 [20] (2009), \n                  \n                    http:\/\/eprint.iacr.org\/2009\/414\n                  \n                  \n                , Citations in this document: \u00a72, \u00a74","DOI":"10.1007\/978-3-642-10366-7_6"},{"key":"5_CR17","unstructured":"G\u00fcnther, C.G. (ed.): EUROCRYPT 1988. LNCS, vol.\u00a0330. Springer, Heidelberg (1988), MR 90a:94002, See [18]"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Lee, P.J., Brickell, E.F.: An observation on the security of McEliece\u2019s public-key cryptosystem. In: Eurocrypt 1988 [17], pp. 275\u2013280 (1988), \n                  \n                    http:\/\/dsns.csie.nctu.edu.tw\/research\/crypto\/HTML\/PDF\/E88\/275.PDF\n                  \n                  \n                , MR 0994669, Citations in this document: \u00a72, \u00a74","DOI":"10.1007\/3-540-45961-8_25"},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"1354","DOI":"10.1109\/18.21270","volume":"34","author":"J.S. Leon","year":"1988","unstructured":"Leon, J.S.: A probabilistic algorithm for computing minimum weights of large error-correcting codes. IEEE Transactions on Information Theory\u00a034, 1354\u20131359 (1988), MR 89k:94072, Citations in this document: \u00a72","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","year":"2009","unstructured":"Matsui, M. (ed.): ASIACRYPT 2009. LNCS, vol.\u00a05912. Springer, Heidelberg (2009), See [16]"},{"key":"5_CR21","unstructured":"McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. JPL DSN Progress Report, 114\u2013116 (1978), \n                  \n                    http:\/\/ipnpr.jpl.nasa.gov\/progress_report2\/42-44\/44N.PDF\n                  \n                  \n                , Citations in this document: \u00a72"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Prange, E.: The use of information sets in decoding cyclic codes. IRE Transactions on Information Theory\u00a0IT-8, S5\u2013S9 (1962), Citations in this document: \u00a72","DOI":"10.1109\/TIT.1962.1057777"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","volume-title":"Progress in Cryptology - INDOCRYPT 2009","year":"2009","unstructured":"Roy, B., Sendrier, N. (eds.): INDOCRYPT 2009. LNCS, vol.\u00a05922. Springer, Heidelberg (2009), See [4]"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Stern, J.: A method for finding codewords of small weight. In: [12], pp. 106\u2013113 (1989), Citations in this document: \u00a72, \u00a74","DOI":"10.1007\/BFb0019850"}],"container-title":["Lecture Notes in Computer Science","Coding and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20901-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T20:05:53Z","timestamp":1558296353000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20901-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642209000","9783642209017"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20901-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}