{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:30:45Z","timestamp":1761744645330,"version":"3.37.3"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Lett."],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1109\/lcomm.2017.2779449","type":"journal-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:02Z","timestamp":1512415082000},"page":"264-267","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis of a Public Key Encryption Scheme Based on QC-LDPC and QC-MDPC Codes"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8673-9097","authenticated-orcid":false,"given":"Vlad","family":"Dragoi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2590-4159","authenticated-orcid":false,"given":"Herve","family":"Tale Kalachi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29360-8_10"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1515\/dma.1992.2.4.439"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1515\/dma.1994.4.3.191"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2014.7011934"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261651"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541753"},{"key":"ref10","first-page":"50","article-title":"On minimum distance decoding of linear codes","author":"dumer","year":"1991","journal-title":"Proceedings of the 4 Joint Swedish-Soviet Int Workshop on Inf Theory"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","author":"gallager","year":"1963","journal-title":"Low-Density Parity-Check Codes"},{"key":"ref12","first-page":"55","article-title":"Secure cryptographic scheme based on modified Reed M&#x00FC;ller codes","volume":"7","author":"gueye","year":"2013","journal-title":"Int J Secur Appl"},{"key":"ref13","first-page":"789","article-title":"A key recovery attack on MDPC with CCA security using decoding errors","author":"qian","year":"2016","journal-title":"Advances in Cryptology"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1023\/A:1027351723034"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-3-319-59879-6_4","article-title":"A reaction attack on the QC-LDPC McEliece cryptosystem","author":"fab\u0161i?","year":"2017","journal-title":"Post-Quantum Cryptography"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38616-9_7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34129-8_45"},{"key":"ref18","first-page":"930","article-title":"Using Reed-Solomon codes in the (U|UV) construction and an application to cryptography","author":"m\u00e1rquez-corbella","year":"2016","journal-title":"Proc IEEE Int Symp Inf Theory (ISIT)"},{"key":"ref19","first-page":"107","article-title":"Decoding random linear codes in $O(2^{0.054n})$","volume":"7073","author":"may","year":"2011","journal-title":"Advances in Cryptology"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s002000050104"},{"key":"ref4","first-page":"346","article-title":"Weak keys for the quasi-cyclic MDPC public key encryption scheme","author":"bardet","year":"2017","journal-title":"Progress in Cryptology"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12929-2_7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29360-8_9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_31"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-9967-z"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541522"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6875072"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02556-8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_9"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72540-4_20"},{"key":"ref21","first-page":"114","article-title":"A public-key system based on algebraic coding theory","author":"mceliece","year":"1978"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2640271"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620590"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18681-8_14"},{"key":"ref25","first-page":"159","article-title":"Knapsack-type cryptosystems and algebraic coding theory","volume":"15","author":"niederreiter","year":"1986","journal-title":"Problems Control Inf Theory"}],"container-title":["IEEE Communications Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4234\/8288712\/08126783.pdf?arnumber=8126783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:27:51Z","timestamp":1642004871000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8126783\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":35,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/lcomm.2017.2779449","relation":{},"ISSN":["1089-7798"],"issn-type":[{"type":"print","value":"1089-7798"}],"subject":[],"published":{"date-parts":[[2018,2]]}}}