{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T22:48:17Z","timestamp":1747176497584,"version":"3.40.5"},"reference-count":23,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2024,7,3]]},"DOI":"10.1080\/01611194.2023.2202960","type":"journal-article","created":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T05:44:35Z","timestamp":1688363075000},"page":"323-351","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["Expanded low-rank parity-check codes and their application to cryptography"],"prefix":"10.1080","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7768-1081","authenticated-orcid":false,"given":"Kamwa Djomou","family":"Franck Rivel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7729-0419","authenticated-orcid":false,"given":"Fouotsa","family":"Emmanuel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8031-1017","authenticated-orcid":false,"given":"Tadmon","family":"Calvin","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2023,7,2]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2804444"},{"key":"e_1_3_2_3_1","first-page":"4","article-title":"Nts-kem","volume":"2","author":"Albrecht M.","year":"2018","unstructured":"Albrecht, M., C. Cid, K. G. Paterson, C. Tjhai, and M. Tomlisson. 2018. Nts-kem. NIST PQC Round 2:4\u201313.","journal-title":"NIST PQC Round"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437464"},{"key":"e_1_3_2_5_1","unstructured":"Aragon N. P. Barreto S. Bettaied L. Bidoux O. Blazy J.-C. Deneuville P. Gaborit S. Gueron T. Guneysu C. A. Melchor et\u00a0al. 2017. Bike: Bit flipping key encapsulation."},{"key":"e_1_3_2_6_1","volume-title":"International Workshop on Coding and Cryptography (WCC 2019)","author":"Aragon N.","year":"2019","unstructured":"Aragon, N., and P. Gaborit. 2019. A key recovery attack against lrpc using decryption failures. In International Workshop on Coding and Cryptography (WCC 2019), Saint-Jacut-de-la-Mer, Norway."},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2933535"},{"key":"e_1_3_2_8_1","doi-asserted-by":"crossref","unstructured":"Bardet M. M. Bros D. Cabarcas P. Gaborit R. Perlner D. Smith-Tone J. Tillich and J. Verbel. 2020. Improvements of algebraic attacks for solving the rank decoding and minrank problems. In Advances in Cryptology \u2013 ASIACRYPT 2020 Cham ed. S. Moriai and H. Wang 507\u201336. Springer International Publishing.","DOI":"10.1007\/978-3-030-64837-4_17"},{"key":"e_1_3_2_9_1","doi-asserted-by":"crossref","unstructured":"Berger T. P. Gaborit and O. Ruatta. 2017. Gabidulin matrix codes and their application to small ciphertext size cryptosystems. In Progress in Cryptology \u2013 INDOCRYPT 2017 Cham ed. A. Patra and N. P. Smart 247\u201366. Springer International Publishing.","DOI":"10.1007\/978-3-319-71667-1_13"},{"key":"e_1_3_2_10_1","first-page":"3","article-title":"Theory of codes with maximum rank distance","volume":"21","author":"Gabidulin E.","year":"1985","unstructured":"Gabidulin, E. 1985. Theory of codes with maximum rank distance. Problemy peredachi informatsii 21:3\u201316.","journal-title":"Problemy peredachi informatsii"},{"key":"e_1_3_2_11_1","doi-asserted-by":"crossref","unstructured":"Gabidulin E. A. Paramonov and O. Tretjakov. 1991. Ideals over a non-commutative ring and their application in cryptology. In Proceedings of advances in Cryptology-EUROCRYPT\u201991. Vol. 547 ed. D. Davies 482\u20139.","DOI":"10.1007\/3-540-46416-6_41"},{"key":"e_1_3_2_12_1","unstructured":"Gaborit P. G. Murat O. Ruatta and G. Z\u00e9mor. 2013. Low rank parity check codes and their application to cryptography. In Proceedings of the Workshop on Coding and Cryptography WCC\u20192013 Norway. Bergen."},{"key":"e_1_3_2_13_1","doi-asserted-by":"crossref","unstructured":"Gaborit P. O. Ruatta J. Schrek and G. Z\u00e9mor. 2016. New results for rank-based cryptography. In AFRICACRYPT 2014: Progress in Cryptology. Vol. 8469 ed. Springer 1\u201312. Cham.","DOI":"10.1007\/978-3-319-06734-6_1"},{"key":"e_1_3_2_14_1","volume-title":"Notes on coding theory","author":"Hall J.","year":"2003","unstructured":"Hall, J. 2003. Notes on coding theory. FreeTechBooks.com."},{"key":"e_1_3_2_15_1","doi-asserted-by":"crossref","unstructured":"Hauteville A. and J. Tillich. 2015. New algorithms for decoding in the rank metric and an attack on the lrpc cryptosystem. In IEEE International Symposium on Information Theory - ISIT 2015 2747\u201351.","DOI":"10.1109\/ISIT.2015.7282956"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2020053"},{"key":"e_1_3_2_17_1","unstructured":"Kim J.-L. Y.-S. Kim L. Galvez M. J. Kim and N. Lee. 2018. Mcnie: A code-based public-key cryptosystem. arXiv preprint arXiv:1812.05008."},{"key":"e_1_3_2_18_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-97916-8_2","article-title":"Key recovery attack on McNie based on low rank parity check codes and its reparation","author":"Lau T.","year":"2018","unstructured":"Lau, T., and C. Tan. 2018. Key recovery attack on McNie based on low rank parity check codes and its reparation. In Advances in Information and Computer Security: 13th International Workshop on Security, IWSEC 2018, Sendai, Japan.","journal-title":"Advances in Information and Computer Security: 13th International Workshop on Security, IWSEC 2018"},{"key":"e_1_3_2_19_1","unstructured":"McEliece R. 1978. A public-key cryptosystem based on algebraic coding theory. In Jet Propulsion Laboratory DSN Progress Report 114\u20136."},{"key":"e_1_3_2_20_1","unstructured":"Melchor C. N. Aragon M. Bardet S. Bettaieb L. Bidoux O. Blazy J.-C. Deneuville P. Gaborit A. Hauteville A. Otmani et\u00a0al. 2018. Rollo-rank-ouroboros. In LAKE & LOCKER."},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1201\/b15006"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11554868_5"},{"key":"e_1_3_2_23_1","doi-asserted-by":"crossref","unstructured":"Samardjiska S. P. Santini E. Persichetti and G. Banegas. 2019. A reaction attack against cryptosystems based on LRPC codes. In Progress in Cryptology\u2013LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America Santiago de Chile Chile.","DOI":"10.1007\/978-3-030-30530-7_10"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2095150"}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611194.2023.2202960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T06:09:54Z","timestamp":1718863794000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01611194.2023.2202960"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,2]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7,3]]}},"alternative-id":["10.1080\/01611194.2023.2202960"],"URL":"https:\/\/doi.org\/10.1080\/01611194.2023.2202960","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"type":"print","value":"0161-1194"},{"type":"electronic","value":"1558-1586"}],"subject":[],"published":{"date-parts":[[2023,7,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}