The following pages link to (Q4474171):
Displaying 50 items.
- Enhanced public key security for the McEliece cryptosystem (Q271573) (← links)
- Identity based identification from algebraic coding theory (Q391761) (← links)
- Quantum-assisted QD-CFS signatures (Q473200) (← links)
- A code-based group signature scheme (Q510499) (← links)
- Computer algebra tales on Goppa codes and McEliece cryptography (Q782704) (← links)
- SoK: how (not) to design and implement post-quantum cryptography (Q826276) (← links)
- A scalable post-quantum hash-based group signature (Q831185) (← links)
- Semantic security for the McEliece cryptosystem without random oracles (Q1009060) (← links)
- On the security of the Courtois-Finiasz-Sendrier signature (Q1643411) (← links)
- Public key compression for constrained linear signature schemes (Q1726681) (← links)
- DAGS: key encapsulation using dyadic GS codes (Q1755960) (← links)
- Cryptanalysis of a code-based full-time signature (Q1981793) (← links)
- A post-quantum UC-commitment scheme in the global random oracle model from code-based assumptions (Q2025352) (← links)
- On the dimension of the subfield subcodes of 1-point Hermitian codes (Q2025360) (← links)
- Variant of Niederreiter-based signature scheme for blockchain technology (Q2079919) (← links)
- Invertible matrices over some quotient rings: identification, generation, and analysis (Q2081006) (← links)
- A correction to a code-based blind signature scheme (Q2163765) (← links)
- A code-based signature scheme from the Lyubashevsky framework (Q2192378) (← links)
- Cryptanalysis of a rank-based signature with short public keys (Q2306903) (← links)
- Asymptotically efficient lattice-based digital signatures (Q2413615) (← links)
- Structural attacks for public key cryptosystems based on Gabidulin codes (Q2425529) (← links)
- Computational aspects of retrieving a representation of an algebraic geometry code (Q2437321) (← links)
- Asymptotic behaviour of codes in rank metric over finite fields (Q2439748) (← links)
- A provably secure short signature scheme based on discrete logarithms (Q2456500) (← links)
- Using low-density parity-check codes to improve the McEliece cryptosystem (Q2658068) (← links)
- Retracted: Invertible matrices over some quotient rings: identification, generation, and analysis (Q2685509) (← links)
- Statistical zero-knowledge and analysis of rank-metric zero-knowledge proofs of knowledge (Q2693627) (← links)
- On the dimension and structure of the square of the dual of a Goppa code (Q2697482) (← links)
- Square Code Attack on a Modified Sidelnikov Cryptosystem (Q2947081) (← links)
- Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks (Q3076975) (← links)
- Wild McEliece (Q3084251) (← links)
- Parallel-CFS (Q3084252) (← links)
- Decoding One Out of Many (Q3102783) (← links)
- An Efficient Attack on All Concrete KKS Proposals (Q3102786) (← links)
- Monoidic Codes in Cryptography (Q3102791) (← links)
- Ensuring Message Embedding in Wet Paper Steganography (Q3104699) (← links)
- A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory (Q3193273) (← links)
- A New Efficient Threshold Ring Signature Scheme Based on Coding Theory (Q3535347) (← links)
- A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model (Q3623048) (← links)
- Code-Based Public-Key Cryptosystems and Their Applications (Q4931667) (← links)
- LESS is More: Code-Based Signatures Without Syndromes (Q5048961) (← links)
- A digital signature scheme $\mathrm{mCFS}^{\mathrm{QC{-}LDPC}}$ based on $\mathrm{QC}$-$\mathrm{LDPC}$ codes (Q5071487) (← links)
- A Secure and Efficient Code-Based Signature Scheme (Q5205021) (← links)
- On the Key-Privacy Issue of McEliece Public-Key Encryption (Q5386092) (← links)
- Oblivious Transfer Based on the McEliece Assumptions (Q5502796) (← links)
- Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme (Q5504550) (← links)
- A New Dynamic Code-Based Group Signature Scheme (Q5739046) (← links)
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies (Q5854432) (← links)
- The security of the code-based signature scheme based on the Stern identification protocol (Q5871430) (← links)
- A new key recovery attack on a code-based signature from the Lyubashevsky framework (Q6072205) (← links)