{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:28:29Z","timestamp":1759638509455,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/isit.2015.7282956","type":"proceedings-article","created":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T18:09:52Z","timestamp":1443722992000},"page":"2747-2751","source":"Crossref","is-referenced-by-count":19,"title":["New algorithms for decoding in the rank metric and an attack on the LRPC cryptosystem"],"prefix":"10.1109","author":[{"given":"Adrien","family":"Hauteville","sequence":"first","affiliation":[]},{"given":"Jean-Pierre","family":"Tillich","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2005.03.012"},{"key":"ref11","article-title":"Low rank parity check codes and their application to cryptography","author":"gaborit","year":"2013","journal-title":"Proceedings of the Workshop on Coding and Cryptography WCC'2013"},{"key":"ref12","article-title":"On the complexity of the rank syndrome decoding problem","author":"gaborit","year":"2013","journal-title":"CoRR abs\/1301 1026"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06734-6_1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282956"},{"key":"ref15","first-page":"19","article-title":"Cryptanalysis of the HFE public key cryptosystem by relinearization","author":"kipnis","year":"1999","journal-title":"Advances in Cryptology - CRYPTO'99 volume 1666 of Lecture Notes in Comput Sci"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-218X(00)00350-4"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/18.959257"},{"key":"ref18","first-page":"234","article-title":"On cellular code and their cryptographic applications","author":"loidreau","year":"2014","journal-title":"Proceedings of ACCT14 (algebraic and combinatorial coding theory)"},{"key":"ref19","first-page":"114","author":"mceliece","year":"1978","journal-title":"A public-key system based on algebraic coding theory"},{"key":"ref4","first-page":"368","article-title":"The cryptographic security of the syndrome decoding problem for rank distance codes","author":"chabaud","year":"1996","journal-title":"Advances in Cryptology - ASIACRYPT 1996"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1998.1608"},{"key":"ref6","first-page":"280","article-title":"Cryptanalysis of Minrank","author":"faug\u00e8re","year":"2008","journal-title":"Advances in Cryptology - CRYPTO 2008 volume 5157 of Lecture Notes in Comput Sci"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(78)90015-8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0036-z"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6875127"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055873"},{"key":"ref1","article-title":"Decoding random binary linear codes in 2n\/20: How 1 + 1 = 0 improves information set decoding","author":"becker","year":"2012","journal-title":"Advanced in Cryptology-CRYPTO 2012 Lecture Notes in Computer Science"},{"key":"ref9","first-page":"482","article-title":"Ideals over a non-commutative ring and their applications to cryptography","author":"gabidulin","year":"1991","journal-title":"Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques number 547 in LNCS"},{"key":"ref20","first-page":"2069","article-title":"MDPC-Mc Eliece: New McEliece variants from moderate density parity-check codes","author":"misoczki","year":"2013","journal-title":"Proc IEEE Int Symp Inf Theory ISIT"},{"key":"ref22","first-page":"50","article-title":"A new structural attack for GPT and variants","volume":"3715","author":"overbeck","year":"2005","journal-title":"Mycrypt"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1023\/A:1020369320078"}],"event":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","start":{"date-parts":[[2015,6,14]]},"location":"Hong Kong, Hong Kong","end":{"date-parts":[[2015,6,19]]}},"container-title":["2015 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7270906\/7282397\/07282956.pdf?arnumber=7282956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T18:52:42Z","timestamp":1490381562000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7282956\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isit.2015.7282956","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}