based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019...

70
Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its variants Lattice based Jon-Lark Kim Sogang University 3. 1. 2019 U. of California at Irvine Crypto Seminar Rank metric Mc- Eliece Polynomial based Code based Post Quantum Cryptography

Transcript of based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019...

Page 1: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Quantum resistant code-based

cryptosystems: the McEliece

cryptosystem and its variants

Lattice based

Jon-Lark Kim Sogang University

3. 1. 2019

U. of California at Irvine

Crypto Seminar

Rank

metric

Mc- Eliece

Polynomial based

Code based

Post Quantum Cryptography

Page 2: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Contents

01. Introduction to Coding Theory

02. Code-Based Cryptography

03. Attacks on Code-Based Crypto

Page 3: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

1. Introduction to Coding Theory

Page 4: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Coding and Other Areas

4

Page 5: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Father of Information Theory

5

Page 6: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Shannon’s Communication Channel

6

Page 7: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Inventor of error-correcting codes

7

Page 8: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Two Operations on Finite Alphabets

8

Page 9: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

What is a code?

9

Page 10: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Linear code: most useful code

10

A linear [n,k,d] code with d=n-k+1 is called an MDS code.

Page 11: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Nearest neighbor decoding

11

Page 12: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Dual of a linear code

12

Page 13: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Simple example

13

Page 14: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Relation between 𝐶1 and 𝐶2

14

Page 15: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Weight enumerator

15

Page 16: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

MacWilliams’ identity

16

3

3

Page 17: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Encoding linear codes

17

Page 18: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Decoding linear codes

18

Page 19: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Syndrome decoding

19

Page 20: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Example: Hamming [7,4,3] binary code

20

Page 21: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Your answer?

21

• Decoding algorithm for the any Hamming [n=2^r, n-r, 0] code: • If the syndrome of a received vector is i-th column of H, then

there is an error in the i-th position.

Page 22: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Hamming code as a perfect code

22

• Note that there are16 codewords in the Hamming [7,4,3] code:

{1000011, 0100101, 0010110, 0001111, 1100110, 1010101, 1001100, 0110011, 0101010, 0011001, 1110000, 1101001, 1011010, 0111100, 0000000, 1111111}

• Theorem: Any binary vector of length 7 has distance at most 1 from some Hamming codeword.

• Proof: A ball of each code has 8 vectors within distance 1. There are 16 codewords. Any two balls are disjoint since min. distance of the Hamming code is 3.

• Thus the equality holds: 8 × 16 = 27= the size of all binary vectors of length 7

Page 23: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Hamming code as a perfect code

23

• Note that there are16 codewords in the Hamming [7,4,3] code:

{1000011, 0100101, 0010110, 0001111, 1100110, 1010101, 1001100, 0110011, 0101010, 0011001, 1110000, 1101001, 1011010, 0111100, 0000000, 1111111}

• Theorem: Any binary vector of length 7 has distance at most 1 from some Hamming codeword.

• Proof: A ball of each code has 8 vectors within distance 1. There are 16 codewords. Any two balls are disjoint since min. distance of the Hamming code is 3.

• Thus the equality holds: 8 × 16 = 27= the size of all binary vectors of length 7

Page 24: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

QUANTUM-RESISTANT

CRYPTOGRAPHY

24

Page 25: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Insecurity of RSA and ECC

25

• Peter Shor(now at Applied Math Dept at MIT): Quantum algorithm solves factorization and discrete log problem in polynomial time.

• If a quantum computer is built, RSA and Elliptic curve cryptosystem will be broken.

• NIST calls for the 1st round competition of Post-Quantum Cryptography due Nov. 2018.

Page 26: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

26

• Quantum-Resistant Cryptography

• based on the NP-hardness of closest vector problem w.r.t. Euclidean metric on 𝑅𝑛

• relevant to encryption and signature schemes

Lattice-based

cryptography

• based on the NP-completeness of syndrome decoding w.r.t. Hamming metric(classical) and rank metric(new) on GF(𝑞)𝑛

• relevant for encryption schemes

Code-based

cryptography

• based on multivariate polynomials over finite fields

• relevant for signature schemes

Multivariate polynomial cryptography

• relevant for signature schemes Hash-based

signatures

* Recently, supersingular elliptic curve isogeny cryptography was introduced for signature.

Page 27: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Comparison of public and private keysizes

with security level 128 bits

27

Cryptosystem Public key size (bits) Private key size (bits)

Lattice-based 6,956 14,000

Lattice-based NTRU 6,130 6,743

Multivariate cryptography 991,000 740,000

Hash-based cryptography 36,000 36,000

Supersingular elliptic curve

isogeny cryptography

6,144 6,144

Code-based 8,373,911 92,027

DC-LRPC 2,809

A random vector

can be used to recover

the different parameters.

Key sizes of post-quantum cryptography

Page 28: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Analogues between Lattices and Codes

28

Lattice based crypto Code based crypto

𝑹𝒏 𝑮𝑭(𝒒)𝒏

Lattice Linear code(=a subspace of 𝑮𝑭(𝒒)𝒏)

Euclidean distance Hamming/rank distance

Theta series Weight enumerator

Gosset/ Leech lattice Hamming/Golay code

Mathieu groups Conway Simple groups

SVP, CVP minimum distance, SDP

Ideal lattice Cyclic codes

LWE(or LNP) public key(A, b=As+e)

Enc(m)= mG’ + e where G’=MGP

Sparse matrix Low Density Parity Check Code

Analogue between Lattice and Code Based Crypto

Page 29: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

MORE ON CODE-BASED

CRYPTOGRAPHY

29

Page 30: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

30

• The McElece cryptosystem

McEliece (1978)

The first public key cryptosystem using error correcting codes (Goppa codes)

No efficient structural attacks that might distinguish between a permuted

Goppa code used by McEliece and a random code

Parameters of binary Goppa codes: 𝒏 = 𝟐𝒎, 𝒌, 𝟐𝒕 + 𝟏 where 𝒕 =𝒏−𝒌

𝒎

Original parameters: 𝒏 = 𝟏𝟎𝟐𝟒, 𝒌 = 𝟓𝟐𝟒, 𝒕 = 𝟓𝟎

resulting in over 100k bits of public keysizes

Goppa code-based McEliece crypto with parameters n=4096, k=3844, t=21

giving 121086 bytes at the security level of 128 bits is still unbroken!

Due to large keysizes, no practical application of code-based

cryptography so far

McEliece: The First Code-Based Crypto

Page 31: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

31

Formal Definition of Goppa codes

Page 32: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

32

Goppa codes as Algebraic Geometry codes

Page 33: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

33

Generalized Reed-Solomon (GRS) codes

Page 34: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

34

Page 35: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

NP Complete Problems in Coding Theory

• Definition: (Binary Syndrome Decoding (SD) problem; SDP)

– Input: An r × n matrix H over F2, a target binary vector s ∈ F2r,

and an integer t > 0.

– Question: Is there a binary word x ∈ F2n of weight ≤ t, such

that s = HxT?

– E. Berlekamp, R. McEliece, H. van Tilborg, “On the inherent intractability of certain coding problems,” IEEE Trans. Inf. Theory, 24(3), pp. 384–386, 1978

Page 36: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

NP Complete Problems in Coding Theory

• Definition: (q-ary Syndrome Decoding (q-SD) problem)

– Input: An r × n matrix H over Fq, a target vector s ∈ Fqr, and

an integer t > 0.

– Question: Is there a word x ∈ Fqn of weight ≤ t, such that s =

HxT?

• Definition: (Goppa Code Distinguishing (GD) problem)

– Input: An (n − k) × n binary matrix H.

– Question: Is H a parity check matrix of a (n, k)-Goppa code or of a random (n, k)-code ?

Page 37: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

McEliece and Niederreier PKC

• McEliece’s vs. Neiderreiter’s Scheme

– C: a binary code of length n and dimension k

– G’ : k n generating matrix for C

– A an invertible matrix and P a permutation matrix

– H: (n–k) n parity check matrix, GHT = 0

– s = HcT: syndrome

McEliece Niederreiter

Public key G=AG’P H

Plaintext x F2k x F2

n, wH(x) = t

Ciphertext y = xG + e, wH(e) = t y = HxT

Ciphertext space F2n F2

n–k

Used codes binary Goppa codes generalized Reed-Solomon codes

Page 38: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

38

• Main problem in the McEliece

cryptosystem

Codes for the McEliece

cryptosystem need to be

with keysize of

thousand bits

secure under

decoding / structural attacks

with fast

encryption/decryption

algorithm

Page 39: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

39

Page 40: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

40

Page 41: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

41

Page 42: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

42

Page 43: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

43

Page 44: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

44

Page 45: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

45

Page 46: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

46

Page 47: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

47

Page 48: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

ATTACKS ON CODE BASED CRYPTOGRAPHY

48

Page 49: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Attacks on code based crypto

49

There are mainly three kinds of attacks. (1) Structural attacks - find keys (i.e., private keys from public keys) (2) Decoding attacks - find a message from a cipher attack - related to finding low-weight codewords (3) Side-channel attacks - against hardware implementations

Page 50: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Structural attacks

50

• Structural attacks use the code structure in order to break the code-based crypto.

• Since different codes have different structures, structural attacks are different in general.

• There are many structural attacks.

1) Sidelnikov-Shestkov’s attack against the Niederreiter PKC using GRS(generalized Reed-Solomon) codes

[“On Cryptosystems based on generalized Reed-Solomon

codes”, Discrete Math, 1992]

Page 51: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Structural attacks

51

2) Stern’s algorithm on Reed-Muller codes [“A method for finding codewords of small weight”, LNCS 388, 1988]

3) Otmani, Tillich, & Dallot’s attack against quasi-cyclic codes (e.g, AC LDPC codes) [“Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes, preprint 2008]

- idea: exploits the QC structure to find a punctured version of the secret key, and then uses Stern’s algorithm to reconstruct the entire secret.

Page 52: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Structural attacks

52

4) Overbeck’s attack against the McEliece PKC based on rank- metric codes [“Structural attacks for public key cryptosystems based on Gabidulin codes”, J. of Cryptology, 2008]

5) Faugere, Otmani, Perret, & Tillich’s attack against McEliece PKC using non-binary QC & QD(quasi-dyadic) code [“Algebraic cryptanalysis of McEliece variants with compact keys’, Eurocrypt, LNCS 6110, 2010 and in SCC ‘10, 2010 as an extension]

Page 53: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Plain-ISD

53

Suppose we pick an information set 𝐼 in 1,2, … , 𝑛 of size 𝑘.

Page 54: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Plain-ISD

54

Page 55: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Lee-Brickell’s generalized ISD

55

• Lee-Brickell allows a set of 𝑝 ∈ 0,1, … , 𝑤 errors in the information set.

• If 𝑝 = 0, then it is a plain-ISD.

• It is known that 𝑝 =2 is optimal in the binary case.

• The probability of success in one iteration is

Page 56: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Stern’s generalized ISD

56

• It allows a set of 𝑝 ∈ 0,1, … , 𝑤 errors in the information set and takes 𝑙 ∈ 0,1, … , 𝑛 − 𝑘 .

• Suppose the information set 𝐼 = 𝐼1 ∪ 𝐼2.

• The probability of success in one iteration is

Page 57: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Error distribution in Stern’s algorithm

57

Page 58: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Finiasz-Sendrier-ISD and others

58

• Finiasz and Sendrier [“Security bounds for the design of code-based cryptosystems”, Asiacrypto, 2009]

• Canteaut and Chabaud [“A new algorithm for finding minimum weight words in a linear code”, IEEE-IT, 1998]

• Bernstein, Lange, & Peters [“Attacking and defending the McEliece cryptosystem”, PQCrypto, Vol. 5299 of LNCS, 2008]

• Peters [“Information-set decoding for linear codes over 𝐹𝑞", In

PQCrypto, 2010]

References

Page 59: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

McNie: a new code-based cryptography

59

Page 60: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

McNie: Key generation

60

Page 61: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

McNie: Encryption

61

Page 62: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

McNie: Decryption

62

Page 63: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Security reduction

63

Page 64: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Apply McNie to rank metric codes

64

Page 65: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Updated parameters for 3,4-QC LRPC codes

65

Page 66: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

A modified McNie with Gabidulin

66

Page 67: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

Connection between Ouroboros-R and McNie

67

Page 68: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

68

• My personal opinion

NTRU Code-based Crypto

LWE

This will contain all good properties of each cryptosystem.

Page 69: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

THANK YOU^^

69

Page 70: based cryptosystems: the McEliece cryptosystem and its ...schollt/multilinear_map... · 3/1/2019  · Quantum resistant code-based cryptosystems: the McEliece cryptosystem and its

References

70