{"id":"https://openalex.org/W2138428646","doi":"https://doi.org/10.1109/isit.2010.5513549","title":"A Smart approach for GPT cryptosystem based on rank codes","display_name":"A Smart approach for GPT cryptosystem based on rank codes","publication_year":2010,"publication_date":"2010-06-01","ids":{"openalex":"https://openalex.org/W2138428646","doi":"https://doi.org/10.1109/isit.2010.5513549","mag":"2138428646"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2010.5513549","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2010.5513549","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1006.0386","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Haitham Rashwan","orcid":null},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Haitham Rashwan","raw_affiliation_strings":["Department of Communications, Lancaster University, Lancaster, UK"],"affiliations":[{"raw_affiliation_string":"Department of Communications, Lancaster University, Lancaster, UK","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ernst M. Gabidulin","orcid":null},"institutions":[{"id":"https://openalex.org/I153845743","display_name":"Moscow Institute of Physics and Technology","ror":"https://ror.org/00v0z9322","country_code":"RU","type":"education","lineage":["https://openalex.org/I153845743"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Ernst M. Gabidulin","raw_affiliation_strings":["Department of Radio Engineering, Moscow Institute of Physics and Technology, State University, Dolgoprudny, Russia"],"affiliations":[{"raw_affiliation_string":"Department of Radio Engineering, Moscow Institute of Physics and Technology, State University, Dolgoprudny, Russia","institution_ids":["https://openalex.org/I153845743"]}]},{"author_position":"last","author":{"id":null,"display_name":"Bahram Honary","orcid":null},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Bahram Honary","raw_affiliation_strings":["Department of Communications, Lancaster University, Lancaster, UK"],"affiliations":[{"raw_affiliation_string":"Department of Communications, Lancaster University, Lancaster, UK","institution_ids":["https://openalex.org/I67415387"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I67415387"],"apc_list":null,"apc_paid":null,"fwci":0.9391,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.8201038,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"2463","last_page":"2467"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.8515999913215637},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5971999764442444},{"id":"https://openalex.org/keywords/rank","display_name":"Rank (graph theory)","score":0.5884000062942505},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4984000027179718},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4528999924659729},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4198000133037567},{"id":"https://openalex.org/keywords/matrix","display_name":"Matrix (chemical analysis)","score":0.4163999855518341},{"id":"https://openalex.org/keywords/polynomial","display_name":"Polynomial","score":0.3971000015735626},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.3862000107765198}],"concepts":[{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.8515999913215637},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5971999764442444},{"id":"https://openalex.org/C164226766","wikidata":"https://www.wikidata.org/wiki/Q7293202","display_name":"Rank (graph theory)","level":2,"score":0.5884000062942505},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4984000027179718},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46549999713897705},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.453000009059906},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4528999924659729},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4198000133037567},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4194999933242798},{"id":"https://openalex.org/C106487976","wikidata":"https://www.wikidata.org/wiki/Q685816","display_name":"Matrix (chemical analysis)","level":2,"score":0.4163999855518341},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.3971000015735626},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.3862000107765198},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37869998812675476},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.3698999881744385},{"id":"https://openalex.org/C2984195096","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public key cryptosystem","level":4,"score":0.34790000319480896},{"id":"https://openalex.org/C77926391","wikidata":"https://www.wikidata.org/wiki/Q603880","display_name":"Finite field","level":2,"score":0.3379000127315521},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.33329999446868896},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.33320000767707825},{"id":"https://openalex.org/C42058472","wikidata":"https://www.wikidata.org/wiki/Q810214","display_name":"Base (topology)","level":2,"score":0.29789999127388},{"id":"https://openalex.org/C151376022","wikidata":"https://www.wikidata.org/wiki/Q168698","display_name":"Exponential function","level":2,"score":0.28630000352859497},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.28049999475479126},{"id":"https://openalex.org/C113709454","wikidata":"https://www.wikidata.org/wiki/Q602136","display_name":"Coding theory","level":2,"score":0.2689000070095062},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.265500009059906},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.2646999955177307},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.2637999951839447},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.2612999975681305},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.2531999945640564}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/isit.2010.5513549","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2010.5513549","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1006.0386","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1006.0386","pdf_url":"https://arxiv.org/pdf/1006.0386","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1006.0386","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1006.0386","pdf_url":"https://arxiv.org/pdf/1006.0386","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1584780183","https://openalex.org/W1603678347","https://openalex.org/W1662906987","https://openalex.org/W2011881257","https://openalex.org/W2015128192","https://openalex.org/W2025108828","https://openalex.org/W2041290864","https://openalex.org/W2090010567","https://openalex.org/W2094420277","https://openalex.org/W2105403121","https://openalex.org/W2109799346","https://openalex.org/W6629364560","https://openalex.org/W6634430639","https://openalex.org/W6770380337"],"related_works":[],"abstract_inverted_index":{"The":[0,10,26,118],"concept":[1],"of":[2,28,51,74,91,113],"Public-key":[3],"cryptosystem":[4,13,77],"was":[5,18],"innovated":[6],"by":[7,22,63,67],"McEliece's":[8],"cryptosystem.":[9,93],"public":[11,49],"key":[12],"based":[14,108],"on":[15,89,109],"rank":[16,29],"codes":[17,30],"presented":[19],"in":[20,31],"1991":[21],"Gabidulin":[23],"-Paramonov-Trejtakov":[24],"(GPT).":[25],"use":[27],"cryptographic":[32],"applications":[33],"is":[34,38,107],"advantageous":[35],"since":[36],"it":[37],"practically":[39],"impossible":[40],"to":[41,82],"utilize":[42],"combinatoric":[43],"decoding.":[44],"This":[45],"has":[46],"enabled":[47],"using":[48],"keys":[50],"a":[52,99,110],"smaller":[53],"size.":[54],"Respective":[55],"structural":[56],"attacks":[57,70,126],"against":[58],"this":[59,95],"system":[60],"were":[61],"proposed":[62],"Gibson":[64],"and":[65,78],"recently":[66],"Overbeck.":[68],"Overbeck's":[69],"break":[71],"many":[72],"versions":[73],"the":[75,92,103,114,129,135],"GPT":[76],"are":[79],"turned":[80],"out":[81],"be":[83],"either":[84],"polynomial":[85],"or":[86],"exponential":[87],"depending":[88],"parameters":[90],"In":[94],"paper,":[96],"we":[97],"introduce":[98],"new":[100],"approach,":[101,105],"called":[102],"Smart":[104,119],"which":[106],"proper":[111],"choice":[112],"distortion":[115],"matrix":[116,132],"X.":[117],"approach":[120],"allows":[121],"for":[122],"withstanding":[123],"all":[124],"known":[125],"even":[127],"if":[128],"column":[130],"scrambler":[131],"P":[133],"over":[134],"base":[136],"field":[137],"F":[138],"<sub":[139],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[140],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">q</sub>":[141],".":[142]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2016-06-24T00:00:00"}
