Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
Pierre Loidreau
CELAr and Universit´ e de Rennes Pierre.Loidreau@m4x.org
Cryptographic applications of codes in rank metric Pierre Loidreau - - PowerPoint PPT Presentation
Cryptographic applications of codes in rank metric Cryptographic applications of codes in rank metric Pierre Loidreau CELAr and Universit e de Rennes Pierre.Loidreau@m4x.org June 16th, 2009 Cryptographic applications of codes in rank
Cryptographic applications of codes in rank metric
CELAr and Universit´ e de Rennes Pierre.Loidreau@m4x.org
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
qm is a (n, M, d)r-code if
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
n→+∞
Cryptographic applications of codes in rank metric
qm, received vector
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
1
n
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
pub
Gpub
S
(G | Z)
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
t
Cryptographic applications of codes in rank metric
qm support vector
qm,
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
qm random
n−W
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric
qm, i = 1, . . . , u of rank W > (n − k)/2.
Cryptographic applications of codes in rank metric
i=1 αiKi + e, where
qm random for all i = 1, . . . , u
u
i αiPi)(
Cryptographic applications of codes in rank metric
u
i=1
Cryptographic applications of codes in rank metric
Cryptographic applications of codes in rank metric