McEliece cryptosystem

Results: 38



#Item
1Code-based Cryptography  Christiane Peters Technical University of Denmark  ECC 2011

Code-based Cryptography Christiane Peters Technical University of Denmark ECC 2011

Add to Reading List

Source URL: ecc2011.loria.fr

Language: English - Date: 2011-09-30 12:40:04
2Differential Power Analysis of a McEliece Cryptosystem Cong Chen1 , Thomas Eisenbarth1 , Ingo von Maurich2 , and Rainer Steinwandt3 1  Worcester Polytechnic Institute, Worcester, MA, USA

Differential Power Analysis of a McEliece Cryptosystem Cong Chen1 , Thomas Eisenbarth1 , Ingo von Maurich2 , and Rainer Steinwandt3 1 Worcester Polytechnic Institute, Worcester, MA, USA

Add to Reading List

Source URL: users.wpi.edu

Language: English - Date: 2015-04-03 09:14:29
    3An efficient attack of a McEliece cryptosystem variant based on convolutional codes Gregory Landais  Jean-Pierre Tillich

    An efficient attack of a McEliece cryptosystem variant based on convolutional codes Gregory Landais Jean-Pierre Tillich

    Add to Reading List

    Source URL: pqcrypto2013.xlim.fr

    Language: English - Date: 2013-06-24 09:56:08
      4Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1  National Institute of Information and Communications Technology (NICT), Japan

      Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1 National Institute of Information and Communications Technology (NICT), Japan

      Add to Reading List

      Source URL: imi.kyushu-u.ac.jp

      - Date: 2007-06-02 00:48:30
        5Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1  National Institute of Information and Communications Technology (NICT), Japan

        Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1 National Institute of Information and Communications Technology (NICT), Japan

        Add to Reading List

        Source URL: imi.kyushu-u.ac.jp

        Language: English - Date: 2007-03-14 18:37:42
          6Living with post quantum cryptography

          Living with post quantum cryptography

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2015-04-02 14:17:26
          7A Polynomial-Time Attack on the BBCRS Scheme 1 Alain Couvreur  Ayoub Otmani 2 Jean-Pierre Tillich

          A Polynomial-Time Attack on the BBCRS Scheme 1 Alain Couvreur Ayoub Otmani 2 Jean-Pierre Tillich

          Add to Reading List

          Source URL: www.iacr.org

          Language: English - Date: 2015-03-30 09:27:24
          8Botan’s Implementation of the McEliece PKC Falko Strenzke cryptosource GmbH  December 30, 2014

          Botan’s Implementation of the McEliece PKC Falko Strenzke cryptosource GmbH December 30, 2014

          Add to Reading List

          Source URL: www.cryptosource.de

          Language: English - Date: 2015-03-02 11:16:55
          9

          PDF Document

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2015-04-02 12:49:59
          10

          PDF Document

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2015-04-02 11:02:34