Two attacks on rank metric code-based schemes: RankSign and an IBE scheme (Q1633440): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / OpenAlex ID
 
Property / OpenAlex ID: W2898448716 / rank
 
Normal rank
Property / arXiv ID
 
Property / arXiv ID: 1804.02556 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035736 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Semi-homomorphic Encryption and Multiparty Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security and composition of multiparty cryptographic protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Three-Party Computation from Cut-and-Choose / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Multiparty Protocols via Log-Depth Threshold Formulae / rank
 
Normal rank
Property / cites work
 
Property / cites work: Asynchronous Multiparty Computation: Theory and Implementation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator / rank
 
Normal rank
Property / cites work
 
Property / cites work: Scalable Secure Multiparty Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Scalable Multiparty Computation with Nearly Optimal Work and Resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: The TinyTable protocol for 2-party secure computation, or: Gate-scrambling revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Yet another compiler for active security or: efficient MPC over arbitrary rings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiparty Computation from Somewhat Homomorphic Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circuits resilient to additive attacks with applications to secure computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure multi-party computation without agreement / rank
 
Normal rank
Property / cites work
 
Property / cites work: Founding Cryptography on Oblivious Transfer – Efficiently / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Constant Round Multi-party Computation Combining BMR and SPDZ / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography - PKC 2006 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Approach to Practical Active-Secure Two-Party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3803024 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Asymptotic behaviour of codes in rank metric over finite fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Decoding Random Linear Codes in $\tilde{\mathcal{O}}(2^{0.054n})$ / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3752293 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Cryptosystems and Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3835408 / rank
 
Normal rank

Latest revision as of 17:26, 17 July 2024

scientific article
Language Label Description Also known as
English
Two attacks on rank metric code-based schemes: RankSign and an IBE scheme
scientific article

    Statements

    Two attacks on rank metric code-based schemes: RankSign and an IBE scheme (English)
    0 references
    20 December 2018
    0 references
    code-based cryptography
    0 references
    cryptanalysis
    0 references
    rank metric
    0 references
    signature scheme
    0 references
    identity based encryption
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers