A code-based hybrid signcryption scheme (Q6175435): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
Normalize DOI.
 
(One intermediate revision by one other user not shown)
Property / DOI
 
Property / DOI: 10.1515/jmc-2022-0002 / rank
Normal rank
 
Property / cites work
 
Property / cites work: Q4364550 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to construct efficient signcryption schemes on elliptic curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4472429 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signcryption Schemes Based on the Diffie–Hellman Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signcryption Schemes Based on Bilinear Maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signcryption Schemes Based on the RSA Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice-based signcryption without random oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Privacy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography - PKC 2006 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Security of Tag-KEM for Signcryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attribute-based signcryption scheme based on linear codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: DAGS: key encapsulation using dyadic GS codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the inherent intractability of certain coding problems (Corresp.) / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the complexity of some cryptographic problems based on the general decoding problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Decoding One Out of Many / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Distinguisher for High-Rate McEliece Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: A NP-Complete Problem in Coding Theory with Application to Code Based Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to mask the structure of codes for a cryptographic use / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reducing Key Length of the McEliece Cryptosystem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Compact McEliece Keys from Goppa Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Monoidic Codes in Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Compact McEliece keys based on quasi-dyadic Srivastava codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3752293 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure and Anonymous Hybrid Encryption from Coding Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Implementation of Hybrid Encryption from Coding Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474171 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How To Prove Yourself: Practical Solutions to Identification and Signature Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: A new identification scheme based on syndrome decoding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: LESS is More: Code-Based Signatures Without Syndromes / rank
 
Normal rank
Property / cites work
 
Property / cites work: A code-based signature scheme from the Lyubashevsky framework / rank
 
Normal rank
Property / cites work
 
Property / cites work: Durandal: a rank metric based signature scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Wave: a new family of trapdoor one-way preimage sampleable functions based on codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3043928 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure integration of asymmetric and symmetric encryption schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: An efficient structural attack on NIST submission DAGS / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the dimension and structure of the square of the dual of a Goppa code / rank
 
Normal rank
Property / cites work
 
Property / cites work: Some remarks on the security of the identification scheme based on permuted kernels / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the binary permuted kernel problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1515/JMC-2022-0002 / rank
 
Normal rank

Latest revision as of 20:09, 30 December 2024

scientific article; zbMATH DE number 7715933
Language Label Description Also known as
English
A code-based hybrid signcryption scheme
scientific article; zbMATH DE number 7715933

    Statements

    A code-based hybrid signcryption scheme (English)
    0 references
    0 references
    0 references
    24 July 2023
    0 references
    coding theory
    0 references
    signature scheme
    0 references
    public-key cryptography
    0 references
    code-based cryptography
    0 references
    signcryption
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references