McEliece cryptosystem

Results: 38



#Item
11

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:13:04
12Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature Kazukuni Kobara Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), 10F 1003, Aki

Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature Kazukuni Kobara Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), 10F 1003, Aki

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-20 21:26:35
13Botan’s Implementation of the McEliece PKC Falko Strenzke cryptosource GmbH  December 30, 2014

Botan’s Implementation of the McEliece PKC Falko Strenzke cryptosource GmbH December 30, 2014

Add to Reading List

Source URL: cryptosource.de

Language: English - Date: 2015-03-02 11:16:55
14Smaller Keys for Code-based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices Stefan Heyse, Ingo von Maurich, Tim G¨ uneysu Horst G¨ ortz Institute for IT-Security

Smaller Keys for Code-based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices Stefan Heyse, Ingo von Maurich, Tim G¨ uneysu Horst G¨ ortz Institute for IT-Security

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 16:50:34
15Timing Attacks against the Syndrome Inversion in Code-based Cryptosystems Falko Strenzke 1  2

Timing Attacks against the Syndrome Inversion in Code-based Cryptosystems Falko Strenzke 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-07 10:49:20
16Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke 1  2

Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-07 11:04:10
17Reaction Attacks Against Several Public-Key Cryptosystems Chris Hall1 , Ian Goldberg2 , and Bruce Schneier1 1  Counterpane Systems

Reaction Attacks Against Several Public-Key Cryptosystems Chris Hall1 , Ian Goldberg2 , and Bruce Schneier1 1 Counterpane Systems

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
18Toward Secure Implementation of McEliece Decryption Mariya Georgieva1 and Fr´ed´eric de Portzamparc1,2,3,4 Gemalto, 6 rue de la Verrerie 92190, Meudon, France1 INRIA, Paris-Rocquencourt Center2 , UPMC Univ Paris 06, UM

Toward Secure Implementation of McEliece Decryption Mariya Georgieva1 and Fr´ed´eric de Portzamparc1,2,3,4 Gemalto, 6 rue de la Verrerie 92190, Meudon, France1 INRIA, Paris-Rocquencourt Center2 , UPMC Univ Paris 06, UM

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-23 08:28:15
191  Secure Random Linear Code Based Public Key Encryption Scheme RLCE Yongge Wang KINDI Center for Computing Research

1 Secure Random Linear Code Based Public Key Encryption Scheme RLCE Yongge Wang KINDI Center for Computing Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-31 03:22:40
20Accepted Papers-Workshop on Cybersecurity in a Post-Quantum World

Accepted Papers-Workshop on Cybersecurity in a Post-Quantum World

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-02-17 11:08:13