Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Raphael Overbeck is active.

Publication


Featured researches published by Raphael Overbeck.


Journal of Mathematical Cryptology | 2007

A Summary of McEliece-Type Cryptosystems and their Security

Daniela Engelbert; Raphael Overbeck; Arthur Schmidt

In this paper we give an overview of some of the cryptographic applications which were derived from the proposal of R. J. McEliece to use error correcting codes for cryptographic purposes. Code based cryptography is an interesting alternative to number theoretic cryptography. Many basic cryptographic functions like encryption, signing, hashing, etc. can be realized using code theoretic concepts. In this paper we briefly show how to correct errors in transmitted data by employing Goppa codes and describe possible applications to public key cryptography. The main focus of this paper is to provide detailed insight into the state of art of cryptanalysis of the McEliece cryptosystem and the effect on different cryptographic applications. We conclude, that for code based cryptography a public key of 88KB offers sufficient security for encryption, while we need a public key of at least 597KB for secure signing.


international conference on progress in cryptology | 2005

A new structural attack for GPT and variants

Raphael Overbeck

In this paper we look at the Gabidulin version of the McEliece cryptosystem (GPT) and its variants. We propose a new polynomial time attack, which recovers an alternative private key. Our attack is applicable to all variants proposed so far and breaks some of them completely.


WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography | 2005

Extending gibson's attacks on the GPT cryptosystem

Raphael Overbeck

In this paper we look at the Gabidulin version of the McEliece cryptosystem (GPT). In order to avoid Gibsons attacks on GPT, several variants have been proposed. We cryptanalyze the variant with column scrambler and the one using reducible rank codes. Employing Gibsons attacks as a black box, we get an efficient attack for the parameter sets proposed for GPT with column scrambler. As a countermeasure to our attack, we propose a new variant of the GPT cryptosystem.


Encyclopedia of Cryptography and Security (2nd Ed.) | 2009

Code-based cryptography

Raphael Overbeck; Nicolas Sendrier


Archive | 2007

Public Key Cryptography based on Coding Theory

Raphael Overbeck


IACR Cryptology ePrint Archive | 2004

Post-Quantum Signatures

Johannes A. Buchmann; Luis Carlos Coronado García; Martin Döring; Daniela Engelbert; Christoph Ludwig; Raphael Overbeck; Arthur Schmidt; Ulrich Vollmer; Ralf-Philipp Weinmann


IACR Cryptology ePrint Archive | 2009

A Step Towards QC Blind Signatures.

Raphael Overbeck


IACR Cryptology ePrint Archive | 2006

Decoding Interleaved Gabidulin Codes and Ciphertext-Security for GPT variants.

Raphael Overbeck


IACR Cryptology ePrint Archive | 2007

Oblivious Transfer via McEliece's PKC and Permuted Kernels.

Kazukuni Kobara; Kirill Morozov; Raphael Overbeck


Lecture Notes in Computer Science | 2006

Statistical decoding revisited

Raphael Overbeck

Collaboration


Dive into the Raphael Overbeck's collaboration.

Top Co-Authors

Avatar

Arthur Schmidt

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Christoph Ludwig

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Johannes A. Buchmann

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Martin Döring

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Ulrich Vollmer

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge