[1]
|
C. Aguilar-Melchor, N. Aragon, S. Bettaieb, L. Bidoux, O. Blazy, J.-C. Deneuville, P. Gaborit, E. Persichetti and G. Zémor, Hamming Quasi-Cyclic (HQC), 2017.
|
[2]
|
C. Aguilar-Melchor, N. Aragon, S. Bettaieb, L. Bidoux, O. Blazy, J.-C. Deneuville, P. Gaborit and G. Zémor, Rank Quasi-Cyclic (RQC), 2017.
|
[3]
|
C. Aguilar-Melchor, O. Blazy, J.-C. Deneuville, P. Gaborit and G. Zémor, Efficient encryption from random quasi-cyclic codes, IEEE Transactions on Information Theory, 64 (2018), 3927-3943.
doi: 10.1109/TIT.2018.2804444.
|
[4]
|
S. Bettaieb, L. Bidoux, P. Gaborit and E. Marcatel, Preventing timing attacks against RQC using constant time decoding of Gabidulin codes, in International Conference on Post-Quantum Cryptography, Springer, (2019), 371–386.
doi: 10.1007/978-3-030-25510-7_20.
|
[5]
|
E. R. Berlekamp, Non-binary BCH Decoding, Technical report, North Carolina State University. Dept. of Statistics, 1966.
|
[6]
|
D. J. Bernstein, T. Chou and P. Schwabe, Mcbits: Fast constant-time code-based cryptography, in International Workshop on Cryptographic Hardware and Embedded Systems, Springer, (2013), 250–272.
doi: 10.1007/978-3-642-40349-1_15.
|
[7]
|
D. J. Bernstein and B-Y. Yang, Fast constant-time gcd computation and modular inversion, in IACR Transactions on Cryptographic Hardware and Embedded Systems, (2019), 340–398.
doi: 10.46586/tches.v2019.i3.340-398.
|
[8]
|
T. Chou, McBits revisited, in International Conference on Cryptographic Hardware and Embedded Systems, Springer, (2017), 213–231.
doi: 10.1007/978-3-319-66787-4_11.
|
[9]
|
R. Chandra. Bose and D. K. Ray-Chaudhuri, On a class of error correcting binary group codes, Information and Control, 3 (1960), 68-79.
doi: 10.1016/S0019-9958(60)90287-4.
|
[10]
|
J.-P. D'Anvers, F. Vercauteren and Ingrid Verbauwhede, On the impact of decryption failures on the security of LWE/LWR based schemes, IACR Cryptology ePrint Archive, (2018), 1089.
|
[11]
|
È. M. Gabidulin, Theory of codes with maximum rank distance, Problemy Peredachi Informatsii, 21 (1985), 3-16.
|
[12]
|
S. Gao and T. Mateer, Additive fast fourier transforms over finite fields, IEEE Transactions on Information Theory, 56 (2010), 6265-6272.
doi: 10.1109/TIT.2010.2079016.
|
[13]
|
A. Hocquenghem, Codes correcteurs d'erreurs, Chiffres, 2 (1959), 147-156.
|
[14]
|
D. Hofheinz, K. Hövelmanns and E. Kiltz, A modular analysis of the Fujisaki-Okamoto transformation, in Theory of Cryptography Conference, Springer, (2017), 341–371.
|
[15]
|
L. L. Joiner and J. J. Komo, Decoding binary BCH codes, in Southeastcon '95, 1995.
doi: 10.1109/SECON.1995.513059.
|
[16]
|
S. Lin and D. J. Costello, in Error control coding, Prentice Hall Englewood Cliffs, (2004).,
|
[17]
|
X. Lu, Y. Liu, Z. Zhang, D. Jia, H. Xue, J. He, B. Li, K. Wang, Z. Liu and H. Yang,
LAC: Practical Ring-LWE based Public-Key Encryption with Byte-Level Modulus, IACR
Cryptology ePrint Archive, (2018), 1009.
|
[18]
|
M. Walters and S. Sinha Roy, Constant-time BCH Error-Correcting Code, in 2020 IEEE International Symposium on Circuits and Systems (ISCAS), Sevilla, (2020), 1–5.
doi: 10.1109/ISCAS45731.2020.9180846.
|
[19]
|
Y. Xu, Implementation of Berlekamp-Massey algorithm without inversion, IEE Proceedings I-Communications, Speech and Vision, 138 (1991), 138-140.
|