{"id":"https://openalex.org/W6944213836","doi":"https://doi.org/10.18725/oparu-50268","title":"The weight-one error channel and its application in code-based cryptography","display_name":"The weight-one error channel and its application in code-based cryptography","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W6944213836","doi":"https://doi.org/10.18725/oparu-50268"},"language":"en","primary_location":{"id":"pmh:oai:elib.uni-konstanz.de-htwg:4968","is_oa":true,"landing_page_url":"https://opus.htwg-konstanz.de/frontdoor/index/index/docId/4968","pdf_url":null,"source":{"id":"https://openalex.org/S4306400170","display_name":"URN-Resolver at the German National Library (German National Library)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2802635041","host_organization_name":"Technische Informationsbibliothek (TIB)","host_organization_lineage":["https://openalex.org/I2802635041"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doc-type:doctoralThesis"},"type":"other","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://opus.htwg-konstanz.de/frontdoor/index/index/docId/4968","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Thiers, Johann-Philipp","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Thiers, Johann-Philipp","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":null,"topics":[],"keywords":[{"id":"https://openalex.org/keywords/mceliece-cryptosystem","display_name":"McEliece cryptosystem","score":0.9205999970436096},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6223000288009644},{"id":"https://openalex.org/keywords/error-detection-and-correction","display_name":"Error detection and correction","score":0.5612000226974487},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5557000041007996},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5467000007629395},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5091000199317932},{"id":"https://openalex.org/keywords/generator-matrix","display_name":"Generator matrix","score":0.44020000100135803},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.38909998536109924},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.374099999666214}],"concepts":[{"id":"https://openalex.org/C16935551","wikidata":"https://www.wikidata.org/wiki/Q1042583","display_name":"McEliece cryptosystem","level":4,"score":0.9205999970436096},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6348000168800354},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6223000288009644},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.5612000226974487},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5557000041007996},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5467000007629395},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5091000199317932},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.49720001220703125},{"id":"https://openalex.org/C1842014","wikidata":"https://www.wikidata.org/wiki/Q1502046","display_name":"Generator matrix","level":3,"score":0.44020000100135803},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4032000005245209},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.38909998536109924},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38280001282691956},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.374099999666214},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.3513999879360199},{"id":"https://openalex.org/C182548165","wikidata":"https://www.wikidata.org/wiki/Q2261483","display_name":"Scrambling","level":2,"score":0.3416999876499176},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.33809998631477356},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.3379000127315521},{"id":"https://openalex.org/C2780992000","wikidata":"https://www.wikidata.org/wiki/Q17016113","display_name":"Generator (circuit theory)","level":3,"score":0.33629998564720154},{"id":"https://openalex.org/C207768971","wikidata":"https://www.wikidata.org/wiki/Q17084187","display_name":"Self-shrinking generator","level":4,"score":0.32179999351501465},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.3068999946117401},{"id":"https://openalex.org/C2400350","wikidata":"https://www.wikidata.org/wiki/Q1752667","display_name":"Linear code","level":4,"score":0.3050000071525574},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3046000003814697},{"id":"https://openalex.org/C67692717","wikidata":"https://www.wikidata.org/wiki/Q187444","display_name":"Low-density parity-check code","level":3,"score":0.29249998927116394},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.2842999994754791},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.2745000123977661},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2667999863624573},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26460000872612},{"id":"https://openalex.org/C95925971","wikidata":"https://www.wikidata.org/wiki/Q3100414","display_name":"Parity-check matrix","level":4,"score":0.25450000166893005},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.2526000142097473}],"mesh":[],"locations_count":3,"locations":[{"id":"pmh:oai:elib.uni-konstanz.de-htwg:4968","is_oa":true,"landing_page_url":"https://opus.htwg-konstanz.de/frontdoor/index/index/docId/4968","pdf_url":null,"source":{"id":"https://openalex.org/S4306400170","display_name":"URN-Resolver at the German National Library (German National Library)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2802635041","host_organization_name":"Technische Informationsbibliothek (TIB)","host_organization_lineage":["https://openalex.org/I2802635041"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doc-type:doctoralThesis"},{"id":"pmh:oai:oparu.uni-ulm.de:123456789/50344","is_oa":true,"landing_page_url":"http://doi.org/10.18725/OPARU-50268","pdf_url":null,"source":{"id":"https://openalex.org/S4306400353","display_name":"OPen Access Repositorium der Universit\u00e4t Ulm (OPARU) (Ulm University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I196349391","host_organization_name":"Universit\u00e4t Ulm","host_organization_lineage":["https://openalex.org/I196349391"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/doctoralThesis"},{"id":"doi:10.18725/oparu-50268","is_oa":true,"landing_page_url":"https://doi.org/10.18725/oparu-50268","pdf_url":null,"source":{"id":"https://openalex.org/S7407052964","display_name":"Universit\u00e4t Ulm, Kommunikations- und Informationszentrum (kiz)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"thesis"}],"best_oa_location":{"id":"pmh:oai:elib.uni-konstanz.de-htwg:4968","is_oa":true,"landing_page_url":"https://opus.htwg-konstanz.de/frontdoor/index/index/docId/4968","pdf_url":null,"source":{"id":"https://openalex.org/S4306400170","display_name":"URN-Resolver at the German National Library (German National Library)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2802635041","host_organization_name":"Technische Informationsbibliothek (TIB)","host_organization_lineage":["https://openalex.org/I2802635041"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doc-type:doctoralThesis"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5134226083755493}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Public-key":[0],"cryptographic":[1,84,442],"algorithms":[2],"are":[3,13,174,191,214,292,315],"an":[4,458],"essential":[5],"part":[6],"of":[7,31,42,62,71,154,163,197,212,233,241,255,346,356,397,400,405,447],"todays":[8],"cyber":[9],"security,":[10],"since":[11,217,290],"those":[12,180,198,288,291],"required":[14],"for":[15,55,177,206,266,287,294,383,434,440,452],"key":[16,105,157,438],"exchange":[17],"protocols,":[18],"digital":[19],"signatures,":[20],"and":[21,44,76,106,130,147,379,415,456],"authentication.":[22],"But":[23],"large":[24],"scale":[25],"quantum":[26],"computers":[27],"threaten":[28],"the":[29,32,39,68,87,107,114,127,140,145,149,152,155,164,188,195,207,222,228,239,245,251,256,295,302,331,354,367,373,410,430,445],"security":[30,232,265],"most":[33],"widely":[34],"used":[35],"public-key":[36,58],"cryptosystems.":[37,422],"Hence,":[38,258],"National":[40],"Institute":[41],"Standards":[43],"Technology":[45],"(":[46,281],"NIST":[47],")":[48,283],"is":[49,65,86,124,137,248],"currently":[50],"in":[51,91,126,259,325,330,412],"a":[52,98,103,121,131,185,263,272,321],"standardization":[53],"process":[54],"post-quantum":[56],"secure":[57,186],"cryptography.":[59,80],"One":[60],"type":[61],"such":[63],"systems":[64],"based":[66,168],"on":[67,169,238],"NP-complete":[69],"problem":[70],"decoding":[72,455],"random":[73,132],"linear":[74],"codes":[75,181,269,284,310],"therefore":[77,457],"called":[78],"code-based":[79,83,234,413,421,441],"The":[81,160,231,423],"best-known":[82],"system":[85,89,166],"McEliece":[88,165,208],"proposed":[90,205,286,424],"1978":[92],"by":[93,244,250],"Robert":[94],"McEliece.":[95],"It":[96],"uses":[97],"scrambled":[99],"generator":[100,109,158],"matrix":[101,110],"as":[102,111,113,116],"public":[104,128,189,437],"original":[108,161],"well":[112],"scrambling":[115],"private":[117,156,229],"key.":[118,230],"When":[119],"encrypting":[120],"message":[122,150],"it":[123],"encoded":[125],"code":[129,202,224,317,392,425,449],"but":[133,210,358],"correctable":[134],"error":[135,252,274,303,337,369,374,401,431],"vector":[136],"added.":[138],"Only":[139],"legitimate":[141],"receiver":[142],"can":[143,380],"correct":[144],"errors":[146,242,357],"decrypt":[148],"using":[151],"knowledge":[153],"matrix.":[159],"proposal":[162],"was":[167],"binary":[170],"Goppa":[171],"codes,":[172],"which":[173,220,247,371,394],"also":[175,359],"considered":[176,215],"standardization.":[178],"While":[179],"seem":[182],"to":[183,226,261,300,335,350,376,418],"be":[184,381],"choice,":[187],"keys":[190],"extremely":[192],"large,":[193],"limiting":[194],"practicality":[196],"systems.":[199,443],"Many":[200],"different":[201,312,384],"families":[203,318],"were":[204,285],"system,":[209],"many":[211,316],"them":[213,417],"insecure":[216],"attacks":[218],"exist,":[219],"use":[221,345,396,446],"known":[223],"structure":[225],"recover":[227],"cryptosystems":[235],"mainly":[236],"depends":[237],"number":[240,355],"added":[243],"sender,":[246],"limited":[249],"correction":[253,275,304,338],"capability":[254,305,339],"code.":[257],"order":[260,299],"obtain":[262],"high":[264,273],"relatively":[267],"short":[268],"one":[270,348,378],"needs":[271,349],"capability.":[276],"Therefore":[277],"maximum":[278],"distance":[279,324],"separable":[280],"MDS":[282],"systems,":[289],"optimal":[293],"Hamming":[296,332],"distance.":[297],"In":[298,362,386],"increase":[301],"we":[306,365,388,408],"propose":[307,366,389],"q":[308],"-ary":[309],"over":[311,340],"metrics.":[313,385],"There":[314],"that":[319,428],"have":[320],"higher":[322],"minimum":[323],"some":[326,390],"other":[327,419],"metric":[328],"than":[329],"metric,":[333],"leading":[334],"increased":[336],"this":[341,347,363,398],"metric.":[342],"To":[343],"make":[344,395],"restrict":[351],"not":[352],"only":[353],"their":[360],"value.":[361],"work,":[364],"weight-one":[368],"channel,":[370],"restricts":[372],"values":[375,432],"weight":[377],"applied":[382],"addition":[387],"concatenated":[391,448],"constructions,":[393],"restriction":[399],"values.":[402],"For":[403],"each":[404],"these":[406],"constructions":[407,426,450],"discuss":[409],"usability":[411],"cryptography":[414],"compare":[416],"state-of-the-art":[420],"show":[427],"restricting":[429],"allows":[433,451],"significantly":[435],"lower":[436],"sizes":[439],"Furthermore,":[444],"low":[453],"complexity":[454],"efficient":[459],"cryptosystem.":[460]},"counts_by_year":[],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
