Code-based cryptography
From MaRDI portal
Publication:3613267
DOI10.1007/978-3-540-88702-7_4zbMath1161.81329OpenAlexW1534643746WikidataQ56700422 ScholiaQ56700422MaRDI QIDQ3613267
Publication date: 12 March 2009
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-88702-7_4
Related Items (21)
Toward secure implementation of McEliece decryption ⋮ Computational quantum key distribution (CQKD) on decentralized ledger and blockchain ⋮ A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory ⋮ ON SOME CRYPTOSYSTEMS BASED ON ALGEBRAIC CODES ⋮ Generalized approach for analysing quantum key distribution experiments ⋮ On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes ⋮ Secure Message Authentication Against Related-Key Attack ⋮ Weaknesses in Two RFID Authentication Protocols ⋮ The non-gap sequence of a subcode of a generalized Reed-Solomon code ⋮ An algorithm for generalized syndrome decoding problem ⋮ Breaking Goppa-based McEliece with hints ⋮ A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors ⋮ Decoding McEliece with a hint -- secret Goppa key parts reveal everything ⋮ A survey of some applications of finite fields ⋮ Attacking and Defending the McEliece Cryptosystem ⋮ Lattice Klepto -- turning post-quantum crypto against itself ⋮ Cryptanalysis of the extension field cancellation cryptosystem ⋮ Wild McEliece ⋮ Decoding One Out of Many ⋮ Computer algebra tales on Goppa codes and McEliece cryptography ⋮ The security of the code-based signature scheme based on the Stern identification protocol
This page was built for publication: Code-based cryptography