Edoardo Persichetti

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Cutting the GRASS: threshold group action signature schemes2024-11-12Paper
A new formulation of the linear equivalence problem and shorter less signatures2024-08-30Paper
DAGS: reloaded revisiting dyadic key encapsulation
Code-Based Cryptography
2024-02-23Paper
Take your MEDS: digital signatures from matrix code equivalence
Progress in Cryptology - AFRICACRYPT 2023
2024-02-02Paper
On the hardness of the Lee syndrome decoding problem
Advances in Mathematics of Communications
2023-12-14Paper
On the computational hardness of the code equivalence problem in cryptography
Advances in Mathematics of Communications
2023-07-07Paper
An attack on a non-interactive key exchange from code equivalence
Tatra Mountains Mathematical Publications
2023-02-21Paper
On Linear Complexity of Finite Sequences: Coding Theory and Applications to Cryptography2023-01-18Paper
LESS is more: code-based signatures without syndromes
Progress in Cryptology - AFRICACRYPT 2020
2022-11-09Paper
Security analysis of a cryptosystem based on subspace subcodes2022-08-11Paper
LESS-FM: fine-tuning signatures from the code equivalence problem2022-03-22Paper
Reproducible families of codes and cryptographic applications
Journal of Mathematical Cryptology
2021-11-05Paper
Cryptanalysis of a code-based full-time signature
Designs, Codes and Cryptography
2021-09-06Paper
Improvement of binary and non binary statistical decoding algorithm2020-07-08Paper
Designing efficient dyadic operations for cryptographic applications
Journal of Mathematical Cryptology
2020-06-24Paper
Tighter proofs of CCA security in the quantum random oracle model2020-04-30Paper
A reaction attack against cryptosystems based on LRPC codes2020-01-14Paper
Code-Based Key Encapsulation from McEliece’s Cryptosystem
Mathematical Aspects of Computer and Information Sciences
2019-03-14Paper
DAGS: key encapsulation using dyadic GS codes
Journal of Mathematical Cryptology
2019-01-11Paper
On the CCA2 security of McEliece in the standard model2018-11-07Paper
CAKE: CODE-based algorithm for key encapsulation2018-04-20Paper
On lower bounds for information set decoding over \(\mathbb F_q\) and on the effect of partial knowledge
International Journal of Information and Coding Theory
2017-07-26Paper
Efficient implementation of hybrid encryption from coding theory
Codes, Cryptology and Information Security
2017-06-01Paper
Leakage-resilient cryptography over large finite fields: theory and practice
Applied Cryptography and Network Security
2016-03-10Paper
Secure and anonymous hybrid encryption from coding theory
Post-Quantum Cryptography
2013-06-14Paper
Compact McEliece keys based on quasi-dyadic Srivastava codes
Journal of Mathematical Cryptology
2012-11-23Paper
Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes
Public Key Cryptography – PKC 2012
2012-07-20Paper


Research outcomes over time


This page was built for person: Edoardo Persichetti