Polynomial structures in code-based cryptography
From MaRDI portal
Publication:2872062
Recommendations
- scientific article; zbMATH DE number 1925556
- scientific article; zbMATH DE number 2085200
- Security bounds for the design of code-based cryptosystems
- Timing attacks against the syndrome inversion in code-based cryptosystems
- Don't forget your roots: constant-time root finding over \(\mathbb{F}_{2^m}\)
Cited in
(1)
This page was built for publication: Polynomial structures in code-based cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2872062)