{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:10:38Z","timestamp":1771611038709,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/redundancy48165.2019.9003318","type":"proceedings-article","created":{"date-parts":[[2020,2,21]],"date-time":"2020-02-21T00:43:17Z","timestamp":1582245797000},"page":"127-132","source":"Crossref","is-referenced-by-count":6,"title":["Interleaving Loidreau\u2019s Rank-Metric Cryptosystem"],"prefix":"10.1109","author":[{"given":"Julian","family":"Renner","sequence":"first","affiliation":[]},{"given":"Sven","family":"Puchinger","sequence":"additional","affiliation":[]},{"given":"Antonia","family":"Wachter-Zeh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2933535"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-017-0354-4"},{"key":"ref33","first-page":"368","article-title":"The Cryptographic Security of the Syndrome Decoding Problem for Rank Distance Codes","author":"chabaud","year":"1996","journal-title":"Int Conf Theory and Appl Cryptology and Inform Security"},{"key":"ref32","article-title":"On the Security of a Loidreau&#x2019;s Rank Metric Code Based Encryption Scheme","volume":"2019","author":"coggia","year":"2019","journal-title":"Proc Workshop on Coding and Cryptography (WCC)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03326-2_3"},{"key":"ref30","article-title":"Decoding high-order interleaved rank-metric codes","author":"puchinger","year":"2019"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282956"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437464"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2511786"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1023\/A:1020369320078"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-007-9160-8"},{"key":"ref40","article-title":"Public Key Cryptography based on Coding Theory","author":"overbeck","year":"2007","journal-title":"Ph D Dissertation"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5206029"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513549"},{"key":"ref13","article-title":"An Evolution of GPT Cryptosystem","author":"loidreau","year":"2016","journal-title":"Int Workshop Alg Combin Coding Theory (ACCT)"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-59879-6_1","article-title":"A New Rank Metric Codes Based Encryption Scheme","author":"loidreau","year":"2017","journal-title":"Int Conf Post-Quantum Cryptogr (PQCrypto)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/BF01390769"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9003-9"},{"key":"ref17","article-title":"Low Rank Parity Check Codes and Their Application to Cryptography","volume":"2013","author":"gaborit","year":"2013","journal-title":"Proc Workshop on Coding and Cryptography (WCC)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71667-1_13"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11779360_24"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2616127"},{"key":"ref4","article-title":"On Interleaved Goppa Codes and Their Applications","author":"holzbaur","year":"2019"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-9953-5"},{"key":"ref3","author":"tillich","year":"2018","journal-title":"Personal communication"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0653(04)00168-4"},{"key":"ref29","first-page":"194","article-title":"Identity-Based Encryption from Codes with Rank Metric","volume":"10403","author":"gaborit","year":"2017","journal-title":"Crypto"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_41"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12929-2_11"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.820038"},{"key":"ref2","article-title":"A Public-Key Cryptosystem from Interleaved Goppa Codes","author":"elleuch","year":"2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/sec.228"},{"key":"ref1","first-page":"114","article-title":"A Public-Key Cryptosystem Based on Algebraic Coding Theory","volume":"4244","author":"mceliece","year":"1978","journal-title":"Coding Thv"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437561"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(78)90015-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2804444"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/18.75248"},{"key":"ref23","first-page":"3","article-title":"Theory of Codes with Maximum Rank Distance","volume":"21","author":"gabidulin","year":"1985","journal-title":"Probl Inf Transm"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2096032"},{"key":"ref25","first-page":"186","article-title":"Decoding Rank Errors Beyond the Error Correcting Capability","author":"loidreau","year":"2006","journal-title":"Int Workshop Alg Combin Coding Theory (ACCT)"}],"event":{"name":"2019 XVI International Symposium \"Problems of Redundancy in Information and Control Systems\" (REDUNDANCY)","location":"Moscow, Russia","start":{"date-parts":[[2019,10,21]]},"end":{"date-parts":[[2019,10,25]]}},"container-title":["2019 XVI International Symposium \"Problems of Redundancy in Information and Control Systems\" (REDUNDANCY)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8985168\/9003308\/09003318.pdf?arnumber=9003318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:53:33Z","timestamp":1658080413000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9003318\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/redundancy48165.2019.9003318","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}