{"id":"https://openalex.org/W1978997608","doi":"https://doi.org/10.1109/isit.2014.6875127","title":"Structural weakness of compact variants of the McEliece cryptosystem","display_name":"Structural weakness of compact variants of the McEliece cryptosystem","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W1978997608","doi":"https://doi.org/10.1109/isit.2014.6875127","mag":"1978997608"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2014.6875127","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2014.6875127","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107405594","display_name":"Jean\u2010Charles Faug\u00e8re","orcid":null},"institutions":[{"id":"https://openalex.org/I39804081","display_name":"Sorbonne Universit\u00e9","ror":"https://ror.org/02en5vm52","country_code":"FR","type":"education","lineage":["https://openalex.org/I39804081"]},{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Jean-Charles Faugere","raw_affiliation_strings":["Sorbonne Universit\u00e9s, UPMC Univ Paris 06, Paris, France","Paris-Rocquencourt Center, INRIA, Le Chesnay, France"],"affiliations":[{"raw_affiliation_string":"Sorbonne Universit\u00e9s, UPMC Univ Paris 06, Paris, France","institution_ids":["https://openalex.org/I39804081"]},{"raw_affiliation_string":"Paris-Rocquencourt Center, INRIA, Le Chesnay, France","institution_ids":["https://openalex.org/I1326498283"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106233582","display_name":"Ayoub Otmani","orcid":"https://orcid.org/0000-0001-8176-8692"},"institutions":[{"id":"https://openalex.org/I4210105918","display_name":"Normandie Universit\u00e9","ror":"https://ror.org/01k40cz91","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210105918"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Ayoub Otmani","raw_affiliation_strings":["Normandie Univ, UR, LITIS, Mont-Saint-Aignan, France","Normandie Univ., Caen, France"],"affiliations":[{"raw_affiliation_string":"Normandie Univ, UR, LITIS, Mont-Saint-Aignan, France","institution_ids":["https://openalex.org/I4210105918"]},{"raw_affiliation_string":"Normandie Univ., Caen, France","institution_ids":["https://openalex.org/I4210105918"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109853693","display_name":"Ludovic Perret","orcid":null},"institutions":[{"id":"https://openalex.org/I39804081","display_name":"Sorbonne Universit\u00e9","ror":"https://ror.org/02en5vm52","country_code":"FR","type":"education","lineage":["https://openalex.org/I39804081"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Ludovic Perret","raw_affiliation_strings":["Sorbonne Universit\u00e9s, UPMC Univ Paris 06, Paris, France","POLSYS, UPMC Univ. Paris 06, Paris, France"],"affiliations":[{"raw_affiliation_string":"Sorbonne Universit\u00e9s, UPMC Univ Paris 06, Paris, France","institution_ids":["https://openalex.org/I39804081"]},{"raw_affiliation_string":"POLSYS, UPMC Univ. Paris 06, Paris, France","institution_ids":["https://openalex.org/I39804081"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081515226","display_name":"Fr\u00e9d\u00e9ric de Portzamparc","orcid":null},"institutions":[{"id":"https://openalex.org/I39804081","display_name":"Sorbonne Universit\u00e9","ror":"https://ror.org/02en5vm52","country_code":"FR","type":"education","lineage":["https://openalex.org/I39804081"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Frederic de Portzamparc","raw_affiliation_strings":["Sorbonne Universit\u00e9s, UPMC Univ Paris 06, Paris, France","POLSYS, UPMC Univ. Paris 06, Paris, France"],"affiliations":[{"raw_affiliation_string":"Sorbonne Universit\u00e9s, UPMC Univ Paris 06, Paris, France","institution_ids":["https://openalex.org/I39804081"]},{"raw_affiliation_string":"POLSYS, UPMC Univ. Paris 06, Paris, France","institution_ids":["https://openalex.org/I39804081"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060302693","display_name":"Jean\u2013Pierre Tillich","orcid":"https://orcid.org/0000-0002-1709-1792"},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Jean-Pierre Tillich","raw_affiliation_strings":["INRIA, Paris-Rocquencourt Center","Paris-Rocquencourt Center, INRIA, Le Chesnay, France"],"affiliations":[{"raw_affiliation_string":"INRIA, Paris-Rocquencourt Center","institution_ids":["https://openalex.org/I1326498283"]},{"raw_affiliation_string":"Paris-Rocquencourt Center, INRIA, Le Chesnay, France","institution_ids":["https://openalex.org/I1326498283"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5107405594"],"corresponding_institution_ids":["https://openalex.org/I39804081","https://openalex.org/I1326498283"],"apc_list":null,"apc_paid":null,"fwci":2.89788631,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.90839758,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1717","last_page":"1721"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mceliece-cryptosystem","display_name":"McEliece cryptosystem","score":0.9905937910079956},{"id":"https://openalex.org/keywords/generator-matrix","display_name":"Generator matrix","score":0.8223087787628174},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6216115951538086},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5745817422866821},{"id":"https://openalex.org/keywords/key-size","display_name":"Key size","score":0.5474267601966858},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47185182571411133},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.44885680079460144},{"id":"https://openalex.org/keywords/generator","display_name":"Generator (circuit theory)","score":0.44280120730400085},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.42863205075263977},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4260813593864441},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4205484688282013},{"id":"https://openalex.org/keywords/public-key-cryptosystem","display_name":"Public key cryptosystem","score":0.41146278381347656},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4076698124408722},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.39324918389320374},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.34300488233566284},{"id":"https://openalex.org/keywords/algebra-over-a-field","display_name":"Algebra over a field","score":0.3267045021057129},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.2979133725166321},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2782317101955414},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.17823106050491333},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.16148841381072998},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16078263521194458},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1337081789970398},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.10813328623771667},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.0580214262008667}],"concepts":[{"id":"https://openalex.org/C16935551","wikidata":"https://www.wikidata.org/wiki/Q1042583","display_name":"McEliece cryptosystem","level":4,"score":0.9905937910079956},{"id":"https://openalex.org/C1842014","wikidata":"https://www.wikidata.org/wiki/Q1502046","display_name":"Generator matrix","level":3,"score":0.8223087787628174},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6216115951538086},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5745817422866821},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.5474267601966858},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47185182571411133},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.44885680079460144},{"id":"https://openalex.org/C2780992000","wikidata":"https://www.wikidata.org/wiki/Q17016113","display_name":"Generator (circuit theory)","level":3,"score":0.44280120730400085},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.42863205075263977},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4260813593864441},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4205484688282013},{"id":"https://openalex.org/C2984195096","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public key cryptosystem","level":4,"score":0.41146278381347656},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4076698124408722},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.39324918389320374},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.34300488233566284},{"id":"https://openalex.org/C136119220","wikidata":"https://www.wikidata.org/wiki/Q1000660","display_name":"Algebra over a field","level":2,"score":0.3267045021057129},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.2979133725166321},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2782317101955414},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.17823106050491333},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.16148841381072998},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16078263521194458},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1337081789970398},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.10813328623771667},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0580214262008667},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2014.6875127","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2014.6875127","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W23137767","https://openalex.org/W68055459","https://openalex.org/W195611444","https://openalex.org/W1520077026","https://openalex.org/W1550367722","https://openalex.org/W1566154368","https://openalex.org/W1897146492","https://openalex.org/W1978997608","https://openalex.org/W1997772212","https://openalex.org/W2017429418","https://openalex.org/W2078870121","https://openalex.org/W2104464473","https://openalex.org/W2110509124","https://openalex.org/W2132642507","https://openalex.org/W2300086762","https://openalex.org/W2619674633","https://openalex.org/W2951786898","https://openalex.org/W6608063172","https://openalex.org/W6633060918","https://openalex.org/W6738920706"],"related_works":["https://openalex.org/W4390438323","https://openalex.org/W2094420277","https://openalex.org/W1597779806","https://openalex.org/W2567184113","https://openalex.org/W2060281493","https://openalex.org/W2184690197","https://openalex.org/W1978997608","https://openalex.org/W1694516557","https://openalex.org/W1979345442","https://openalex.org/W1523986265"],"abstract_inverted_index":{"The":[0],"main":[1],"practical":[2],"limitation":[3],"of":[4,12,32,68],"the":[5,10,25,66,82,85,90,110],"McEliece":[6],"cryptosystem":[7],"is":[8,22,48,78],"probably":[9],"size":[11,27],"its":[13],"public-key.":[14],"To":[15,98],"overcome":[16],"this":[17,99],"issue,":[18],"a":[19,37,45,74,93,103],"famous":[20],"trend":[21],"to":[23,80,89],"decrease":[24],"public-key":[26],"by":[28,50],"focusing":[29],"on":[30,84,92,106],"subclasses":[31],"alternant/Goppa":[33,52,71],"codes":[34,53,72,107],"which":[35,54,108],"admit":[36],"compact":[38,70],"parity-check":[39],"or":[40,58],"generator":[41,61],"matrix.":[42],"For":[43],"instance,":[44],"key-size":[46],"reduction":[47],"obtained":[49],"taking":[51],"have":[55],"quasi-cyclic":[56],"(QC)":[57],"quasi-dyadic":[59],"(QD)":[60],"matrices.":[62],"We":[63],"show":[64],"that":[65],"use":[67,102],"such":[69],"introduced":[73],"fundamental":[75],"weakness.":[76],"It":[77],"possible":[79],"reduce":[81],"key-recovery":[83,91],"original":[86],"public-code":[87],"C":[88],"(much)":[94],"smaller":[95],"code":[96],"C'.":[97],"end,":[100],"we":[101],"new":[104],"operation":[105],"exploits":[109],"automorphism":[111],"group.":[112]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
