{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:56:34Z","timestamp":1764996994859,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/iccw.2013.6649325","type":"proceedings-article","created":{"date-parts":[[2013,11,2]],"date-time":"2013-11-02T00:36:40Z","timestamp":1383352600000},"page":"707-711","source":"Crossref","is-referenced-by-count":18,"title":["Optimization of the parity-check matrix density in QC-LDPC code-based McEliece cryptosystems"],"prefix":"10.1109","author":[{"given":"Marco","family":"Baldi","sequence":"first","affiliation":[]},{"given":"Marco","family":"Bianchi","sequence":"additional","affiliation":[]},{"given":"Franco","family":"Chiaraluce","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Enhanced public key security for the mceliece cryptosystem","author":"baldi","year":"2011","journal-title":"The Journal of Cryptology"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-29011-4_31","article-title":"Decoding random binary linear codes in 2n\/20: How 1 + 1 = 0 improves information set decoding","author":"becker","year":"2012","journal-title":"EUROCRYPT'2012"},{"journal-title":"Scaling Efficient Code-based Cryptosystems for Embedded Platforms","year":"2012","author":"biasi","key":"17"},{"key":"23","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1007\/978-3-642-22792-9_42","article-title":"Smaller decoding exponents: Ball-collision decoding","author":"bernstein","year":"2011","journal-title":"CRYPTO 2011"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2161953"},{"key":"15","article-title":"Security and complexity of the mceliece cryptosystem based on qc-ldpc codes","author":"baldi","year":"2012","journal-title":"IET Information Security"},{"journal-title":"MDPC-McEliece New McEliece Variants from Moderate Density Parity-check Codes","year":"2012","author":"misoczki","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557609"},{"key":"14","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1007\/978-3-540-85855-3_17","article-title":"A new analysis of the mceliece cryptosystem based on qc-ldpc codes","author":"baldi","year":"2008","journal-title":"Security and Cryptography for Networks"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2000.866513"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.161"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_6"},{"key":"3","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-540-88403-3_3","article-title":"Attacking and defending the mceliece cryptosystem","author":"bernstein","year":"2008","journal-title":"Post-Quantum Cryptography"},{"key":"20","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/978-3-642-12929-2_7","article-title":"Information-set decoding for linear codes over fq","author":"peters","year":"2010","journal-title":"Post-Quantum Cryptography"},{"key":"2","first-page":"159","article-title":"Knapsack-type cryptosystems and algebraic coding theory","volume":"15","author":"niederreiter","year":"1986","journal-title":"Probl Contr and Inform Theory"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2463183.2463194"},{"key":"1","first-page":"114","article-title":"A public-key cryptosystem based on algebraic coding theory","author":"mceliece","year":"1978","journal-title":"DSN progress report"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2010.5592833"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2009.05.070047"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/18.748992"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057683"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2187515"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/iccw.2011.5963540"}],"event":{"name":"2013 ICC - 2013 IEEE International Conference on Communication Workshop (ICC)","start":{"date-parts":[[2013,6,9]]},"location":"Budapest, Hungary","end":{"date-parts":[[2013,6,13]]}},"container-title":["2013 IEEE International Conference on Communications Workshops (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6637583\/6649166\/06649325.pdf?arnumber=6649325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T22:59:06Z","timestamp":1564613946000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6649325\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iccw.2013.6649325","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}