{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:13:04Z","timestamp":1760202784664,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.23919\/softcom.2018.8555831","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T00:46:31Z","timestamp":1543884391000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Two Countermeasures against Reaction Attacks on LEDApkc and other QC-MDPC and QC-LDPC based McEliece Cryptosystems in ARQ Setting Heuristic Discussion"],"prefix":"10.23919","author":[{"given":"Peter","family":"Farkas","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1007\/978-3-662-53887-6_29","article-title":"A key recovery attack on MDPC with CCA security using decoding errors","volume":"10031","author":"guo","year":"2016","journal-title":"Advances in Cryptology -ASIACRYPT 2016"},{"key":"ref11","first-page":"51","article-title":"A Reaction Attack on the QC-LDPC McEliece Cryptosystem","author":"fab\u0161i?","year":"2017","journal-title":"Post-Quantum Cryptography PQCrypto 2017 LNCS"},{"year":"0","key":"ref12"},{"key":"ref13","article-title":"A Reaction Attack on LEDApkc","author":"fab\u0161i?","year":"0","journal-title":"Cryptology ePrint Archive Report 2018 \/140"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","author":"gallager","year":"1963","journal-title":"Low Density Parity Check Codes"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20050237"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9003-9"},{"key":"ref3","first-page":"3","article-title":"LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes","volume":"10786","author":"baldi","year":"2018","journal-title":"Post-Quantum Cryptography-PQCrypto 2018"},{"key":"ref6","first-page":"160","article-title":"LDPC codes in the McEliece cryptosystem: attacks and countermeasures","volume":"23","author":"baldi","year":"2009","journal-title":"NATO Advanced Research Workshop 2008 Enhancing Crypto- Primitives with Techniques from Coding Theory NATO Science for Peace and Security Series - D Information and Communication Security"},{"key":"ref5","first-page":"61","article-title":"Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes","volume":"6061","author":"wieschebrink","year":"2010","journal-title":"Post-Quantum Cryptography PQCrypto 2010 LNCS"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2000.866513"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.161"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-014-9187-8"},{"key":"ref1","first-page":"114","article-title":"A public-key cryptosystem based on algebraic coding theory","author":"mceliece","year":"1978","journal-title":"DSN progress report"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11786-009-0015-8"}],"event":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","start":{"date-parts":[[2018,9,13]]},"location":"Split, Croatia","end":{"date-parts":[[2018,9,15]]}},"container-title":["2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8538965\/8555735\/08555831.pdf?arnumber=8555831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T04:27:56Z","timestamp":1643257676000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8555831\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.23919\/softcom.2018.8555831","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}