{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T16:56:27Z","timestamp":1774976187615,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,4,20]],"date-time":"2014-04-20T00:00:00Z","timestamp":1397952000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s10623-014-9967-z","type":"journal-article","created":{"date-parts":[[2014,4,19]],"date-time":"2014-04-19T07:32:32Z","timestamp":1397892752000},"page":"641-666","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":86,"title":["Distinguisher-based attacks on public-key cryptosystems using Reed\u2013Solomon codes"],"prefix":"10.1007","volume":"73","author":[{"given":"Alain","family":"Couvreur","sequence":"first","affiliation":[]},{"given":"Philippe","family":"Gaborit","sequence":"additional","affiliation":[]},{"given":"Val\u00e9rie","family":"Gauthier-Uma\u00f1a","sequence":"additional","affiliation":[]},{"given":"Ayoub","family":"Otmani","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Tillich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,20]]},"reference":[{"key":"9967_CR1","unstructured":"Baldi M., Bianchi M., Chiaraluce F., Rosenthal J., Schipani D.: Enhanced public key security for the McEliece cryptosystem. ArXiv:1108.2462v2 (2011, Submitted)."},{"key":"9967_CR2","unstructured":"Baldi M., Bianchi M., Chiaraluce F., Rosenthal J., Schipani D.: Enhanced public key security for the McEliece cryptosystem. ArXiv:1108.2462v3 (2012, Submitted)."},{"key":"9967_CR3","doi-asserted-by":"crossref","unstructured":"Berger T.P., Loidreau P.: How to mask the structure of codes for a cryptographic use. Des. Codes Cryptogr. 35(1), 63\u201379 (2005).","DOI":"10.1007\/s10623-003-6151-2"},{"key":"9967_CR4","doi-asserted-by":"crossref","unstructured":"Bernstein D.J., Lange T., Peters C.: Wild McEliece. In: Selected Areas in Cryptography, pp. 143\u2013158 (2010).","DOI":"10.1007\/978-3-642-19574-7_10"},{"key":"9967_CR5","unstructured":"Bogdanov A., Lee C.H.: Homomorphic encryption from codes. ArXiv:1111.4301. This paper was accepted for publication in the proceedings of the 44th ACM Symposium on Theory of Computing (STOC). The authors withdrew their paper after they learned that their scheme was threatened (2011)."},{"key":"9967_CR6","doi-asserted-by":"crossref","unstructured":"Bosma W., Cannon J.J., Playoust Catherine: The Magma algebra system. I: the user language. J. Symb. Comput. 24(3\/4), 235\u2013265 (1997).","DOI":"10.1006\/jsco.1996.0125"},{"key":"9967_CR7","doi-asserted-by":"crossref","unstructured":"Brakerski Z.: When homomorphism becomes a liability. In: TCC, pp. 143\u2013161 (2013).","DOI":"10.1007\/978-3-642-36594-2_9"},{"key":"9967_CR8","unstructured":"Cascudo I., Chen H., Cramer R., Xing C.: Asymptotically good ideal linear secret sharing with strong multiplication over any fixed finite field. In: Halevi S. (ed.) Advances in Cryptology: CRYPTO 2009. Lecture Notes in Computer Science, vol. 5677, pp. 466\u2013486. Springer, Berlin (2009)."},{"key":"9967_CR9","unstructured":"Cascudo I., Cramer R., Xing C.: The torsion-limit for algebraic function fields and its application to arithmetic secret sharing. In: Rogaway P. (ed.) Advances in Cryptology: CRYPTO 2011. Lecture Notes in Computer Science, vol. 6841, pp. 685\u2013705. Springer, Berlin (2011)."},{"key":"9967_CR10","unstructured":"Chizhov I.V., Bordodin M.A.: The failure of McEliece PKC based on Reed\u2013Muller codes. Cryptology ePrint Archive, Report 2013\/287 (2013)."},{"key":"9967_CR11","doi-asserted-by":"crossref","unstructured":"Couvreur A., Otmani A., Tillich J.P.: Polynomial time attack on wild McEliece over quadratic extensions. In: EUROCRYPT (2014) (To appear).","DOI":"10.1007\/978-3-642-55220-5_2"},{"key":"9967_CR12","unstructured":"Faug\u00e8re J.-C., Gauthier V., Otmani A., Perret L., Tillich J.-P.: A distinguisher for high rate McEliece cryptosystems. In: Proceedings of the Information Theory Workshop 2011, ITW 2011, Paraty, Brasil, pp. 282\u2013286 (2011)."},{"key":"9967_CR13","unstructured":"Faug\u00e8re J.-C., Gauthier-Uma\u00f1a V., Otmani A., Perret L., Tillich J.-P.: A distinguisher for high-rate McEliece cryptosystems. IEEE Trans. Inf. Theory, 59(10), 6830\u20136844 (2013)."},{"key":"9967_CR14","unstructured":"Faure C., Minder L.: Cryptanalysis of the McEliece cryptosystem over hyperelliptic curves. In: Proceedings of the Eleventh International Workshop on Algebraic and Combinatorial Coding Theory, Pamporovo, Bulgaria, pp. 99\u2013107 (2008)."},{"key":"9967_CR15","unstructured":"Gauthier V., Otmani A., Tillich J.-P.: A distinguisher-based attack on a variant of McEliece\u2019s cryptosystem based on Reed\u2013Solomon codes. http:\/\/arxiv.org\/abs\/1204.6459 (2012)."},{"key":"9967_CR16","unstructured":"Gibson J.: Equivalent Goppa codes and trapdoors to McEliece\u2019s public key cryptosystem. In: Davies D. (ed.) Advances in Cryptology: EUROCRYPT 91. Lecture Notes in Computer Science, vol. 547, pp. 517\u2013521. Springer, Berlin (1991)."},{"key":"9967_CR17","doi-asserted-by":"crossref","unstructured":"Huffman W.C., Pless V.: Fundamentals of Error-Correcting Codes. Cambridge University Press, Cambridge (2003).","DOI":"10.1017\/CBO9780511807077"},{"key":"9967_CR18","unstructured":"K\u00f6tter R.: A unified description of an error locating procedure for linear codes. In: Proceedings of the Algebraic and Combinatorial Coding Theory, Voneshta Voda, pp. 113\u2013117 (1992)."},{"key":"9967_CR19","unstructured":"Loidreau P., Sendrier N.: Weak keys in the McEliece public-key cryptosystem. IEEE Trans. Inf. Theory 47(3), 1207\u20131211 (2001)."},{"key":"9967_CR20","unstructured":"M\u00e1rquez-Corbella I., Mart\u00ednez-Moro E., Pellikaan R.: Evaluation of public-key cryptosystems based on algebraic geometry codes. In: Borges J., Villanueva M. (eds.) Proceedings of the Third International Castle Meeting on Coding Theory and Applications, Barcelona, pp. 199\u2013204 (2011)."},{"key":"9967_CR21","unstructured":"M\u00e1rquez-Corbella I., Mart\u00ednez-Moro E., Pellikaan R.: The non-gap sequence of a subcode of a generalized Reed\u2013Solomon code. In: Finiasz M., Sendrier N., Charpin P., Otmani A. (eds.) Proceedings of the 7th International Workshop on Coding and Cryptography WCC 2011, Paris, pp. 183\u2013193 (2011)."},{"key":"9967_CR22","unstructured":"M\u00e1rquez-Corbella I., Mart\u00ednez-Moro E., Pellikaan R.: The non-gap sequence of a subcode of a generalized Reed\u2013Solomon code. Des. Codes Cryptogr. 66, 1\u201317 (2012)."},{"key":"9967_CR23","unstructured":"M\u00e1rquez-Corbella, I., Mart\u00ednez-Moro, E., Pellikaan, R.: On the unique representation of very strong algebraic geometry codes. Des. Codes Cryptogr. 70, 1\u201316 (2012)."},{"key":"9967_CR24","unstructured":"M\u00e1rquez-Corbella I., Pellikaan R.: Error-correcting pairs for a public-key cryptosystem (2012) (preprint)."},{"key":"9967_CR25","unstructured":"MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes, 5th edn. North-Holland, Amsterdam (1986)."},{"key":"9967_CR26","unstructured":"McEliece R.J.: A public-key system based on algebraic coding theory, pp. 114\u2013116. Jet Propulsion Lab, DSN Progress, Report 44 (1978)."},{"key":"9967_CR27","unstructured":"Minder L., Shokrollahi A.: Cryptanalysis of the sidelnikov cryptosystem. In: EUROCRYPT 2007, Barcelona. Lecture Notes in Computer Science, vol. 4515, pp. 347\u2013360 (2007)."},{"key":"9967_CR28","unstructured":"Niederreiter H.: Knapsack-type cryptosystems and algebraic coding theory. Probl. Control Inf. Theory 15(2), 159\u2013166 (1986)."},{"key":"9967_CR29","doi-asserted-by":"crossref","unstructured":"Pellikaan R.: On decoding by error location and dependent sets of error positions. Discret. Math. 106\u2013107, 368\u2013381 (1992).","DOI":"10.1016\/0012-365X(92)90567-Y"},{"key":"9967_CR30","unstructured":"Sidelnikov V.M.: A public-key cryptosystem based on Reed\u2013Muller codes. Discret. Math. Appl. 4(3), 191\u2013207 (1994)."},{"key":"9967_CR31","unstructured":"Sidelnikov V.M., Shestakov S.O.: On the insecurity of cryptosystems based on generalized Reed\u2013Solomon codes. Discret. Math. Appl. 1(4), 439\u2013444 (1992)."},{"key":"9967_CR32","doi-asserted-by":"crossref","unstructured":"Wieschebrink C.: Two NP-complete problems in coding theory with an application in code based cryptography. In: IEEE International Symposium on Information Theory, pp. 1733\u20131737 (2006).","DOI":"10.1109\/ISIT.2006.261651"},{"key":"9967_CR33","unstructured":"Wieschebrink C.: Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes. In: Sendrier N. (ed.) Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010. Lecture Notes in Computer Science, vol. 6061, pp. 61\u201372. Springer, Darmstadt (2010)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-014-9967-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-014-9967-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-014-9967-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T18:03:01Z","timestamp":1565373781000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-014-9967-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,20]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["9967"],"URL":"https:\/\/doi.org\/10.1007\/s10623-014-9967-z","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,20]]}}}