Barg, S. (1994). Some new np-complete coding problems.
Problemy Peredachi Informatsii, 30(3):23–28.
Becker, A., Joux, A., May, A., and Meurer, A. (2012). De-
coding random binary linear codes in 2n/20: How 1+
1= 0 improves information set decoding. In Annual
International Conference on the Theory and Appli-
cations of Cryptographic Techniques, pages 520–536.
Springer.
Berlekamp, E., McEliece, R., and van Tilborg, H. (1978).
On the Inherent Intractability of Certain Coding Pro-
blems. IEEE Transactions on Information Theory,
24(3):384–386.
Cayrel, P.-L., Gaborit, P., and Prouff, E. (2008). Secure im-
plementation of the stern authentication and signature
schemes for low-resource devices. In International
Conference on Smart Card Research and Advanced
Applications, pages 191–205. Springer.
Cayrel, P.-L., V
´
eron, P., and Alaoui, S. M. E. Y. (2010).
A zero-knowledge identification scheme based on the
q-ary syndrome decoding problem. In International
Workshop on Selected Areas in Cryptography, pages
171–186. Springer.
Courtois, N. T., Finiasz, M., and Sendrier, N. (2001).
How to Achieve a McEliece-Based Digital Signature
Scheme. In Advances in Cryptology – ASIACRYPT
2001. ASIACRYPT 2001. Lecture Notes in Computer
Science, volume 2248, pages 157–174.
Dallot, L. (2008). Towards a Concrete Security Proof of
Courtois, Finiasz and Sendrier Signature Scheme. In
Research in Cryptology. WEWoRC 2007. Lecture No-
tes in Computer Science, volume 4945, pages 65–77.
Debris-Alazard, T., Sendrier, N., and Tillich, J.-P. (2017).
The problem with the SURF scheme. https://arxiv.org/
abs/1706.08065v4.
Durstenfeld, R. (1964). Algorithm 235: Random permuta-
tion. Commun. ACM, 7(7):420–.
Faug
´
ere, J.-C., Gauthier-Umana, V., Otmani, A., Perret, L.,
and Tillich, J.-P. (2011). A Distinguisher for High-
Rate McEliece Cryptosystems. In Information Theory
Workshop (ITW), IEEE, pages 282–286.
Finiasz, M. and Sendrier, N. (2009). Security Bounds for
the Design of Code-Based Cryptosystems. In Advan-
ces in Cryptology – ASIACRYPT 2009, volume 5912,
pages 88–105.
Gaborit, P. and Girault, M. (2007). Lightweight code-based
identification and signature. In Information Theory,
2007. ISIT 2007. IEEE International Symposium on,
pages 191–195. IEEE.
Jain, A., Krenn, S., Pietrzak, K., and Tentes, A. (2012).
Commitments and efficient zero-knowledge proofs
from learning parity with noise. In International Con-
ference on the Theory and Application of Cryptology
and Information Security, pages 663–680. Springer.
Kabatianskii, G., Krouk, E., and Smeets, B. (1997). A
Digital Signature Scheme Based on Random Error-
Correcting Codes. In Proceedings of the 6th IMA In-
ternational Conference on Cryptography and Coding.
May, A., Meurer, A., and Thomae, E. (2011). Decoding
random linear codes in
˜
O(2
0.054n
). In International
Conference on the Theory and Application of Crypto-
logy and Information Security, pages 107–124. Sprin-
ger.
Morozov, K., Roy, P. S., Steinwandt, R., and Xu, R. (2018).
On the security of the courtois-finiasz-sendrier signa-
ture. Open Mathematics, 16(1):161–167.
Niebuhr, R., Persichetti, E., Cayrel, P.-L., Bulygin, S., and
Buchmann, J. (2017). On lower bounds for informa-
tion set decoding over 𝕗 q and on the effect of
partial knowledge. International journal of informa-
tion and Coding Theory, 4(1):47–78.
Otmani, A. and Tillich, J.-P. (2011). An Efficient Attack on
All Concrete KKS Proposals. In Post-Quantum Cryp-
tography. PQCrypto 2011. Lecture Notes in Computer
Science, volume 7071, pages 98–116.
Pointcheval, D. and Stern, J. (2000). Security Arguments
for Digital Signatures and Blind Signatures. Journal
of Cryptology, 13(3):361–396.
Shor, P. (1994). Polynomial-time algorithm for prime fac-
torization and discrete logarithms on a quantum com-
puter: proc. In 35th Annual Symp. on the Foundations
of Computer Science, volume 124.
Stern, J. (1988). A method for finding codewords of small
weight. In International Colloquium on Coding The-
ory and Applications, pages 106–113. Springer.
Stern, J. (1994). A new identification scheme based on
syndrome decoding. In Advances in Cryptology –
CRYPTO 1993. Lecture Notes in Computer Science,
volume 773, pages 13–21.
V
´
eron, P. (1997). Improved identification schemes based on
error-correcting codes. Applicable Algebra in Engi-
neering, Communication and Computing, 8(1):57–69.
ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy
220