{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,10,5]],"date-time":"2022-10-05T18:32:05Z","timestamp":1664994725046},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,4,24]],"date-time":"2014-04-24T00:00:00Z","timestamp":1398297600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s10623-014-9960-6","type":"journal-article","created":{"date-parts":[[2014,4,23]],"date-time":"2014-04-23T14:13:23Z","timestamp":1398262403000},"page":"625-640","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Improved algorithms for finding low-weight polynomial multiples in $$\\mathbb {F}_{2}^{}[x]$$ F 2 [ x ] and some cryptographic applications"],"prefix":"10.1007","volume":"73","author":[{"given":"Carl","family":"L\u00f6ndahl","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Johansson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,24]]},"reference":[{"key":"9960_CR1","doi-asserted-by":"crossref","unstructured":"\u00c5gren M., Hell M., Johansson T., L\u00f6ndahl C.: Improved message passing techniques in fast correlation attacks on stream ciphers. In: 7th International Symposium on Turbo Codes & Iterative Information Processing (2012).","DOI":"10.1109\/ISTC.2012.6325183"},{"key":"9960_CR2","unstructured":"Aumasson J., Finiasz M., Meier W., Vaudenay S.: TCHo: a hardware-oriented trapdoor cipher. In: Pieprzyk J., Ghodosi H., Dawson E. (eds.) ACISP. Lecture Notes in Computer Science, vol. 4586, pp. 184\u2013199. Springer, Berlin (2007)."},{"key":"9960_CR3","unstructured":"Becker A., Joux A., May A., Meurer A.: Decoding random binary linear codes in $$2^n\/20$$ 2 n \/ 20 : How 1 + 1 = 0 improves information set decoding. In: Pointcheval D., Johansson T. (eds.) Advances in Cryptology\u2014EUROCRYPT 2012. Lecture Notes in Computer Science, vol. 7237, pp. 520\u2013536. Springer, Berlin (2012)."},{"key":"9960_CR4","doi-asserted-by":"crossref","unstructured":"Bernstein D.J.: Introduction to post-quantum cryptography. In: Bernstein D.J., Buchmann J., Dahmen E. (eds.) Post-Quantum Cryptography, pp. 1\u201314. Springer, Berlin (2009).","DOI":"10.1007\/978-3-540-88702-7"},{"key":"9960_CR5","doi-asserted-by":"crossref","unstructured":"Bernstein D.J., Lange T., Peters C.: Attacking and defending the McEliece cryptosystem. In: PQCrypto 2008, pp. 31\u201346 (2008).","DOI":"10.1007\/978-3-540-88403-3_3"},{"key":"9960_CR6","unstructured":"Bernstein D.J., Lange T., Peters C.: Smaller decoding exponents: ball collision decoding. In: Rogway P. (ed.) Advances in Cryptology\u2014CRYPTO 2011. Lecture Notes in Computer Science, vol. 6841, pp. 743\u2013760. Springer, Berlin (2011)."},{"key":"9960_CR7","doi-asserted-by":"crossref","unstructured":"Canteaut A., Chabaud F.: A new algorithm for finding minimum-weight words in a linear code: application to McEliece\u2019s cryptosystem and to narrow-sense BCH codes of length 511. IEEE Trans. Inf. Theory 44, 367\u2013378 (1998).","DOI":"10.1109\/18.651067"},{"key":"9960_CR8","unstructured":"Canteaut A., Trabbia M.: Improved fast correlation attacks using parity-check equations of weight 4 and 5. In: Preneel B. (ed.) Advances in Cryptology\u2013EUROCRYPT 2000. Lecture Notes in Computer Science, vol. 1807, pp. 573\u2013588. Springer, Berlin (2000)."},{"key":"9960_CR9","unstructured":"Chose P., Joux A., Mitton M.: Fast correlation attacks: an algorithmic point of view. In: Boneh D. (ed.) Advances in Cryptology\u2013EUROCRYPT 2002. Lecture Notes in Computer Science, vol. 2332, pp. 209\u2013221. Springer, Berlin (2002)."},{"key":"9960_CR10","unstructured":"Didier F., Laigle-Chapuy Y.: Finding low-weight polynomial multiples using discrete logarithm. In: Goldsmith A., Shokrollahi A., Medard M., Zamir R. (eds.) International Symposium on Information Theory\u2013ISIT 2007. IEEE, CCSd (2007)."},{"key":"9960_CR11","unstructured":"El Aimani L., von zur Gathen J.: Finding low weight polynomial multiples using lattices. In: Cryptology ePrint Archive, Report 2007\/423 (2007)."},{"key":"9960_CR12","unstructured":"Finiasz M., Vaudenay S.: When stream cipher analysis meets public-key cryptography. In: Biham E., Youssef A.M. (eds.) Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 4356 , pp. 266\u2013284. Springer, Berlin (2006)."},{"key":"9960_CR13","unstructured":"Finiasz M., Sendrier N.: Security bounds for the design of code-based cryptosystems. In: Matsui M. (ed.) Advances in Cryptology\u2014ASIACRYPT 2009. Lecture Notes in Computer Science, vol. 4586, pp. 88\u2013105. Springer, Berlin (2009)."},{"key":"9960_CR14","unstructured":"Goli\u0107, J.D.: Computation of low-weight parity-check polynomials. Electron. Lett. 32(21), 1981\u20131982 (1996)."},{"key":"9960_CR15","unstructured":"Herrmann M., Leander G.: A practical key recovery attack on basic. In: Jarecki S., Tsudik G. (eds) Public Key Cryptography\u2014PKC 2009. Lecture Notes in Computer Science, vol. 5443, pp. 411\u2013424. Springer, Berlin (2009)."},{"key":"9960_CR16","unstructured":"Johansson T., L\u00f6ndahl C.: An improvement to Stern\u2019s algorithm. Internal Report. http:\/\/lup.lub.lu.se\/record\/2204753 (2011). Accessed 20 Aug 2013."},{"key":"9960_CR17","doi-asserted-by":"crossref","unstructured":"Joux A.: Algorithmic Cryptanalysis. Chapman & Hall\/CRC, Boco Raton (2009).","DOI":"10.1201\/9781420070033"},{"key":"9960_CR18","unstructured":"May A., Meurer A., Thomae E.: Decoding random linear codes in $$\\tilde{\\cal O}{2^{0.054n}}$$ O ~ 2 0.054 n . In: Lee D.-H., Wang X. (eds.) Advances in Cryptology\u2013ASIACRYPT 2011. Lecture Notes in Computer Science, vol. 7073, pp. 107\u2013124. Springer, Berlin (2011)."},{"key":"9960_CR19","unstructured":"McEliece R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Progress Report 42\u201344, pp. 114\u2013116 (1978)."},{"key":"9960_CR20","doi-asserted-by":"crossref","unstructured":"Meier W., Staffelbach O.: Fast correlation attacks on certain stream ciphers. J. Cryptol. 1(3), 159\u2013176 (1989).","DOI":"10.1007\/BF02252874"},{"key":"9960_CR21","unstructured":"Shor P.W.: Algorithms for quantum computation: Discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, 20\u201322 Nov 1994, Santa Fe, NM, pp. 124\u2013134. IEEE Press, Washington (1994)."},{"key":"9960_CR22","unstructured":"Stern J.: A method for finding codewords of small weight. In: Wolfmann J., Cohen G.D. (eds.) Coding Theory and Applications. Lecture Notes in Computer Science, vol. 388, pp. 106\u2013113. Springer, Berlin (1989)."},{"key":"9960_CR23","unstructured":"Wagner D.: A generalized birthday problem. In: Yung M. (ed.) Advances in Cryptology\u2014CRYPTO 2002. Lecture Notes in Computer Science, vol. 2442, pp. 288\u2013303. Springer, Berlin (2002)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-014-9960-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-014-9960-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-014-9960-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T20:48:28Z","timestamp":1565383708000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-014-9960-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,24]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["9960"],"URL":"https:\/\/doi.org\/10.1007\/s10623-014-9960-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,24]]}}}