{"id":"https://openalex.org/W3184115396","doi":"https://doi.org/10.1109/access.2023.3271767","title":"On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight","display_name":"On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W3184115396","doi":"https://doi.org/10.1109/access.2023.3271767","mag":"3184115396"},"language":"en","primary_location":{"id":"doi:10.1109/access.2023.3271767","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3271767","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2023.3271767","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069577574","display_name":"Luca Mariot","orcid":"https://orcid.org/0000-0003-3089-6517"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Luca Mariot","raw_affiliation_strings":["Semantics, Cybersecurity &#x0026; Services Group, University of Twente, Enschede, NB, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Semantics, Cybersecurity &#x0026; Services Group, University of Twente, Enschede, NB, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024072796","display_name":"Stjepan Picek","orcid":"https://orcid.org/0000-0001-7509-4337"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]},{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Stjepan Picek","raw_affiliation_strings":["Department of Intelligent Systems, Delft University of Technology, CD Delft, The Netherlands","Digital Security Group, Radboud University, 6525 XZ Nijmegen, The Netherlands","Department of Intelligent Systems, Delft University of Technology, 2628 CD Delft, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Intelligent Systems, Delft University of Technology, CD Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]},{"raw_affiliation_string":"Digital Security Group, Radboud University, 6525 XZ Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]},{"raw_affiliation_string":"Department of Intelligent Systems, Delft University of Technology, 2628 CD Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064219794","display_name":"Radinka Yorgova","orcid":null},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Radinka Yorgova","raw_affiliation_strings":["Department of Intelligent Systems, Delft University of Technology, CD Delft, The Netherlands","Department of Intelligent Systems, Delft University of Technology, 2628 CD Delft, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Intelligent Systems, Delft University of Technology, CD Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]},{"raw_affiliation_string":"Department of Intelligent Systems, Delft University of Technology, 2628 CD Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5024072796"],"corresponding_institution_ids":["https://openalex.org/I145872427","https://openalex.org/I98358874"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.5822,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.85757478,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"11","issue":null,"first_page":"43511","last_page":"43519"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mceliece-cryptosystem","display_name":"McEliece cryptosystem","score":0.979116678237915},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6871844530105591},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5397042036056519},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.4602007567882538},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.400043249130249},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.37861233949661255},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.34729474782943726},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2321975827217102}],"concepts":[{"id":"https://openalex.org/C16935551","wikidata":"https://www.wikidata.org/wiki/Q1042583","display_name":"McEliece cryptosystem","level":4,"score":0.979116678237915},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6871844530105591},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5397042036056519},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.4602007567882538},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.400043249130249},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.37861233949661255},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.34729474782943726},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2321975827217102},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1109/access.2023.3271767","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3271767","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:boa.unimib.it:10281/502239","is_oa":true,"landing_page_url":"https://hdl.handle.net/10281/502239","pdf_url":"https://boa.unimib.it/bitstream/10281/502239/1/Mariot-2023-IEEE%20Access-VoR.pdf","source":{"id":"https://openalex.org/S4306401259","display_name":"BOA (University of Milano-Bicocca)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66752286","host_organization_name":"University of Milano-Bicocca","host_organization_lineage":["https://openalex.org/I66752286"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:repository.ubn.ru.nl:2066/293140","is_oa":true,"landing_page_url":"https://hdl.handle.net/2066/293140","pdf_url":"https://repository.ubn.ru.nl//bitstream/handle/2066/293140/293140.pdf","source":{"id":"https://openalex.org/S4306401067","display_name":"Radboud Repository (Radboud University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I145872427","host_organization_name":"Radboud University Nijmegen","host_organization_lineage":["https://openalex.org/I145872427"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article / Letter to editor"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/e2db3d00-3c4d-4b1e-a92b-b92c5959a169","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/e2db3d00-3c4d-4b1e-a92b-b92c5959a169","pdf_url":"https://ris.utwente.nl/ws/files/354389916/On_McEliece-Type_Cryptosystems_Using_Self-Dual_Codes_With_Large_Minimum_Weight.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Mariot, L, Picek, S & Yorgova, R 2023, 'On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight', IEEE Access, vol. 11, pp. 43511-43519. https://doi.org/10.1109/ACCESS.2023.3271767","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:tud:oai:tudelft.nl:uuid:69d8a57d-f4ea-4ac5-9a0c-3fcb8290650f","is_oa":true,"landing_page_url":"http://resolver.tudelft.nl/uuid:69d8a57d-f4ea-4ac5-9a0c-3fcb8290650f","pdf_url":"https://repository.tudelft.nl/file/File_d3dc258b-c69d-45b2-a20a-3d48253b98d2","source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, 11","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:doaj.org/article:6a759b55621a4b8a8791ff8c7beaeb26","is_oa":true,"landing_page_url":"https://doaj.org/article/6a759b55621a4b8a8791ff8c7beaeb26","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 43511-43519 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2023.3271767","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3271767","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1510132879","https://openalex.org/W1536493828","https://openalex.org/W1556443961","https://openalex.org/W1574075570","https://openalex.org/W1856342626","https://openalex.org/W1942594900","https://openalex.org/W1965275036","https://openalex.org/W1979345442","https://openalex.org/W1985709119","https://openalex.org/W1990361074","https://openalex.org/W1999064382","https://openalex.org/W2018124973","https://openalex.org/W2026103826","https://openalex.org/W2054325583","https://openalex.org/W2061822288","https://openalex.org/W2065151783","https://openalex.org/W2090010567","https://openalex.org/W2091121840","https://openalex.org/W2103398070","https://openalex.org/W2114972298","https://openalex.org/W2124107181","https://openalex.org/W2126474167","https://openalex.org/W2149636648","https://openalex.org/W2156837852","https://openalex.org/W2164795491","https://openalex.org/W2164888763","https://openalex.org/W2169607896","https://openalex.org/W2245993970","https://openalex.org/W2280569118","https://openalex.org/W2397163278","https://openalex.org/W2586042870","https://openalex.org/W2604514895","https://openalex.org/W2619674633","https://openalex.org/W2964118487","https://openalex.org/W2972750602","https://openalex.org/W2978669775","https://openalex.org/W2986959318","https://openalex.org/W3172550433","https://openalex.org/W3176030130","https://openalex.org/W4390865640","https://openalex.org/W6712350030","https://openalex.org/W6770380337","https://openalex.org/W6798399818"],"related_works":["https://openalex.org/W2212229713","https://openalex.org/W2973501904","https://openalex.org/W4389313746","https://openalex.org/W2150802958","https://openalex.org/W4390438323","https://openalex.org/W1597779806","https://openalex.org/W1694516557","https://openalex.org/W3150242960","https://openalex.org/W4229939163","https://openalex.org/W2567184113"],"abstract_inverted_index":{"One":[0],"of":[1,21,29,58,79,96,116,135],"the":[2,7,13,22,26,56,76,80,94,123,151,157,161,181],"Round":[3],"3":[4],"Finalists":[5],"in":[6,67,150],"NIST":[8],"post-quantum":[9],"cryptography":[10],"call":[11],"is":[12,19,164,174],"Classic":[14],"McEliece":[15,159],"cryptosystem.":[16,154],"Although":[17],"it":[18,140],"one":[20],"most":[23],"secure":[24],"cryptosystems,":[25],"large":[27,46,100,130],"size":[28,163],"its":[30],"public":[31],"key":[32,162],"remains":[33],"a":[34,42,68,84,107,112,129,143],"practical":[35],"limitation.":[36],"In":[37],"this":[38],"work,":[39],"we":[40,74,127],"propose":[41],"McEliece-type":[43,108,153],"cryptosystem":[44,70],"using":[45],"minimum":[47,101,131],"distance":[48,132],"error-correcting":[49],"codes":[50,62,98],"derived":[51],"from":[52],"self-dual":[53,133],"codes.":[54],"To":[55],"best":[57],"our":[59],"knowledge,":[60],"such":[61],"have":[63],"not":[64],"been":[65],"implemented":[66,105],"code-based":[69],"until":[71],"now.":[72],"Moreover,":[73],"modify":[75],"decryption":[77,85],"step":[78],"system":[81,183],"by":[82,166],"introducing":[83],"algorithm":[86],"based":[87],"on":[88],"two":[89],"private":[90],"keys.":[91],"We":[92],"determine":[93],"parameters":[95],"binary":[97],"with":[99],"distance,":[102],"which,":[103],"if":[104],"into":[106],"cryptosystem,":[109,160],"would":[110],"provide":[111],"security":[113,125],"level":[114],"respectively":[115],"80,":[117],"128,":[118],"and":[119,138,186],"256":[120],"bits.":[121],"For":[122],"80-bit":[124],"case,":[126],"construct":[128],"code":[134,146],"length":[136],"1064,":[137],"use":[139],"to":[141,147,156,176,179],"derive":[142],"random":[144],"punctured":[145],"be":[148,177],"used":[149],"corresponding":[152],"Compared":[155],"original":[158],"reduced":[165],"about":[167],"38.5%,":[168],"although":[169],"an":[170],"optimal":[171],"decoding":[172],"set":[173],"yet":[175],"constructed":[178],"make":[180],"new":[182],"fully":[184],"defined":[185],"usable.":[187]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
