McEliece cryptosystem

Results: 38



#Item
21Wild McEliece Incognito Daniel J. Bernstein1 , Tanja Lange2 , and Christiane Peters3 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

Wild McEliece Incognito Daniel J. Bernstein1 , Tanja Lange2 , and Christiane Peters3 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-09-15 08:54:20
22A note on CCA2-protected McEliece cryptosystem with a systematic public key Pavol Zajac? UIM FEI STU, Ilkovicova 3, 81219 Bratislava, Slovakia [removed]

A note on CCA2-protected McEliece cryptosystem with a systematic public key Pavol Zajac? UIM FEI STU, Ilkovicova 3, 81219 Bratislava, Slovakia [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-22 04:29:49
23Some results in group-based cryptography Ciaran Mullan Technical Report RHUL–MA–2012–1

Some results in group-based cryptography Ciaran Mullan Technical Report RHUL–MA–2012–1

Add to Reading List

Source URL: www.ma.rhul.ac.uk

Language: English - Date: 2012-01-12 06:55:53
24New Classes of Public Key Cryptosystems over F28 Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)ΣΠPKC Masao KASAHARA  ∗

New Classes of Public Key Cryptosystems over F28 Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)ΣΠPKC Masao KASAHARA ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-21 23:59:57
25Coding Techniques for Data-Storage Systems  Thesis by Yuval Cassuto In Partial Fulfillment of the Requirements

Coding Techniques for Data-Storage Systems Thesis by Yuval Cassuto In Partial Fulfillment of the Requirements

Add to Reading List

Source URL: paradise.caltech.edu

Language: English - Date: 2008-02-08 01:45:28
26The McEliece Cryptosystem Resists Quantum Fourier Sampling Attack Cristopher Moore University of New Mexico and the Santa Fe Institute Joint work with

The McEliece Cryptosystem Resists Quantum Fourier Sampling Attack Cristopher Moore University of New Mexico and the Santa Fe Institute Joint work with

Add to Reading List

Source URL: tuvalu.santafe.edu

Language: English - Date: 2011-04-14 11:01:36
27SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks[removed]Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: [removed]sec.274 RESEARCH ARTICLE

SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks[removed]Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: [removed]sec.274 RESEARCH ARTICLE

Add to Reading List

Source URL: bbcr.uwaterloo.ca

Language: English - Date: 2011-07-16 17:53:26
28Post-Quantum Signatures Johannes Buchmann Carlos Coronado  Daniela Engelbert

Post-Quantum Signatures Johannes Buchmann Carlos Coronado Daniela Engelbert

Add to Reading List

Source URL: itslab.csce.kyushu-u.ac.jp

Language: English - Date: 2012-07-09 05:17:42
29Code-based Cryptography  Christiane Peters

Code-based Cryptography Christiane Peters

Add to Reading List

Source URL: christianepeters.files.wordpress.com

Language: English - Date: 2012-10-11 17:39:42
30Polynomial Time Attack on Wild McEliece Over Quadratic Extensions Alain Couvreur1 , Ayoub Otmani2 , and Jean–Pierre Tillich3

Polynomial Time Attack on Wild McEliece Over Quadratic Extensions Alain Couvreur1 , Ayoub Otmani2 , and Jean–Pierre Tillich3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-02-13 14:34:46