@inproceedings{d17726fff6844b17918a6decfbe9e0eb,
title = "An efficient structural attack on NIST submission DAGS",
abstract = "We present an efficient key recovery attack on code based encryption schemes using some quasi-dyadic alternant codes with extension degree 2. This attack permits to break the proposal DAGS recently submitted to NIST.",
keywords = "Alternant codes, Code-based cryptography, Key recovery attack, McEliece encryption scheme, Quasi-dyadic codes, Schur product of codes",
author = "{\'E}lise Barelli and Alain Couvreur",
note = "Publisher Copyright: {\textcopyright} 2018, International Association for Cryptologic Research.; 24th Annual International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT 2018 ; Conference date: 02-12-2018 Through 06-12-2018",
year = "2018",
month = jan,
day = "1",
doi = "10.1007/978-3-030-03326-2\_4",
language = "English",
isbn = "9783030033255",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "93--118",
editor = "Thomas Peyrin and Steven Galbraith",
booktitle = "Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings",
}