scientific article; zbMATH DE number 2081064

From MaRDI portal
Revision as of 06:12, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4474171

zbMath1062.94556MaRDI QIDQ4474171

Nicolas T. Courtois, Matthieu Finiasz, Nicolas Sendrier

Publication date: 4 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2248/22480157.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.





Related Items (68)

Enhanced public key security for the McEliece cryptosystemSoK: how (not) to design and implement post-quantum cryptographyA scalable post-quantum hash-based group signatureLESS is More: Code-Based Signatures Without SyndromesOn the security of the Courtois-Finiasz-Sendrier signatureA digital signature scheme $\mathrm{mCFS}^{\mathrm{QC{-}LDPC}}$ based on $\mathrm{QC}$-$\mathrm{LDPC}$ codesA Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding TheoryA correction to a code-based blind signature schemeUsing low-density parity-check codes to improve the McEliece cryptosystemAsymptotically efficient lattice-based digital signaturesSquare Code Attack on a Modified Sidelnikov CryptosystemIdentity based identification from algebraic coding theoryAttack on a code-based signature scheme from QC-LDPC codesA new key recovery attack on a code-based signature from the Lyubashevsky frameworkOn codes and learning with errors over function fieldsCode-Based Signature Schemes from Identification Protocols in the Rank MetricA code-based signature scheme from the Lyubashevsky frameworkChosen-ciphertext secure code-based threshold public key encryptions with short ciphertextImproved information set decoding algorithms over Galois ring in the Lee metricAnalysis of (U,U+V)-code problem with Gramian over binary and ternary fieldsStructural attacks for public key cryptosystems based on Gabidulin codesRetracted: Invertible matrices over some quotient rings: identification, generation, and analysisA code-based hybrid signcryption schemeStatistical zero-knowledge and analysis of rank-metric zero-knowledge proofs of knowledgeOn the dimension and structure of the square of the dual of a Goppa codeComputational aspects of retrieving a representation of an algebraic geometry codeAsymptotic behaviour of codes in rank metric over finite fieldsA New Efficient Threshold Ring Signature Scheme Based on Coding TheoryOn the Key-Privacy Issue of McEliece Public-Key EncryptionPublic key compression for constrained linear signature schemesQuantum-assisted QD-CFS signaturesA provably secure short signature scheme based on discrete logarithmsCryptanalysis of a code-based full-time signatureA code-based group signature schemeDAGS: key encapsulation using dyadic GS codesA New Dynamic Code-Based Group Signature SchemeCode-Based Public-Key Cryptosystems and Their ApplicationsA post-quantum UC-commitment scheme in the global random oracle model from code-based assumptionsOn the dimension of the subfield subcodes of 1-point Hermitian codesWave Parameter SelectionHigh weight code-based signature scheme from QC-LDPC codes\textsf{FuLeeca}: a Lee-based signature schemeA Secure and Efficient Code-Based Signature SchemeOn two modifications of the McEliece PKE and the CFS signature schemePost-quantum secure fully-dynamic logarithmic-size deniable group signature in code-based settingOn the rank decoding problem over finite principal ideal ringsA new approach based on quadratic forms to attack the McEliece cryptosystemInjective rank metric trapdoor functions with homogeneous errorsA CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard ModelAccelerating Signature-Based Broadcast Authentication for Wireless Sensor NetworksProbabilistic hash-and-sign with retry in the quantum random oracle modelSemantic security for the McEliece cryptosystem without random oraclesPost-quantum cryptosystems: open problems and current solutions. Isogeny-based and code-based cryptosystemsFuLeakage: breaking FuLeeca by learning attacksWild McElieceParallel-CFSCryptanalysis of a rank-based signature with short public keysDecoding One Out of ManyAn Efficient Attack on All Concrete KKS ProposalsMonoidic Codes in CryptographyEnsuring Message Embedding in Wet Paper SteganographyVariant of Niederreiter-based signature scheme for blockchain technologyInvertible matrices over some quotient rings: identification, generation, and analysisComputer algebra tales on Goppa codes and McEliece cryptographyOblivious Transfer Based on the McEliece AssumptionsTowards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature SchemeA Post-quantum Digital Signature Scheme Based on Supersingular IsogeniesThe security of the code-based signature scheme based on the Stern identification protocol







This page was built for publication: