Back to Results
First PageMeta Content
McEliece cryptosystem / Post-quantum cryptography / Semantic security / Chosen-ciphertext attack / Cryptanalysis / Cryptographic hash function / Ciphertext / Niederreiter cryptosystem / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce


A note on CCA2-protected McEliece cryptosystem with a systematic public key Pavol Zajac? UIM FEI STU, Ilkovicova 3, 81219 Bratislava, Slovakia [removed]
Add to Reading List

Document Date: 2014-08-22 04:29:49


Open Document

File Size: 194,79 KB

Share Result on Facebook

City

Bratislava / Berlin / /

Company

Ball / Bernstein / Cryptographic Hardware / Embedded Systems / /

Country

Slovakia / /

/

IndustryTerm

public-key systems / brute force search / encryption algorithm / /

Organization

North Atlantic Treaty Organization / U.S. Securities and Exchange Commission / NATOs Public Diplomacy Division / /

Person

Jintai Ding / Kazukuni Kobara / Stefan Heyse / David Pointcheval / Hideki Imai / Thomas A Berson / Robert Niebuhr / Stanislav Bulygin / Christof Paar / Raphael Overbeck / H. Gregor Molter / Christiane Peters / Eike Kohnert / Thorsten Wink / Abdulhadi Shoufan / Anne Canteaut / Mohammed Meziani / Thomas Eisenbarth / Tanja Lange / Phillip Rogaway / Daniel J. Bernstein / Johannes Buchmann / Bhaskar Biswas / Sorin A. Huss / Nicolas Sendrier / /

Product

Hybrid McEliece / /

ProgrammingLanguage

C / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

Encryption / Cryptography / following algorithm / McEliece encryption / public key / encryption algorithm / smart card / private key / Secret key / pdf / subsequent symmetric encryption / /

URL

http /

SocialTag