Code-based cryptography
From MaRDI portal
Publication:3613267
DOI10.1007/978-3-540-88702-7_4zbMath1161.81329WikidataQ56700422 ScholiaQ56700422MaRDI QIDQ3613267
Publication date: 12 March 2009
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-88702-7_4
Related Items
Computational quantum key distribution (CQKD) on decentralized ledger and blockchain, ON SOME CRYPTOSYSTEMS BASED ON ALGEBRAIC CODES, The security of the code-based signature scheme based on the Stern identification protocol, An algorithm for generalized syndrome decoding problem, Breaking Goppa-based McEliece with hints, Decoding McEliece with a hint -- secret Goppa key parts reveal everything, Computer algebra tales on Goppa codes and McEliece cryptography, A survey of some applications of finite fields, Lattice Klepto -- turning post-quantum crypto against itself, The non-gap sequence of a subcode of a generalized Reed-Solomon code, Cryptanalysis of the extension field cancellation cryptosystem, Generalized approach for analysing quantum key distribution experiments, Toward secure implementation of McEliece decryption, On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes, Secure Message Authentication Against Related-Key Attack, Weaknesses in Two RFID Authentication Protocols, A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors, Wild McEliece, Decoding One Out of Many, A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory, Attacking and Defending the McEliece Cryptosystem