scientific article; zbMATH DE number 2081064

From MaRDI portal
Publication:4474171

zbMath1062.94556MaRDI QIDQ4474171

Nicolas T. Courtois, Matthieu Finiasz, Nicolas Sendrier

Publication date: 4 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2248/22480157.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (57)

Enhanced public key security for the McEliece cryptosystemSoK: how (not) to design and implement post-quantum cryptographyA scalable post-quantum hash-based group signatureLESS is More: Code-Based Signatures Without SyndromesOn the security of the Courtois-Finiasz-Sendrier signatureA digital signature scheme $\mathrm{mCFS}^{\mathrm{QC{-}LDPC}}$ based on $\mathrm{QC}$-$\mathrm{LDPC}$ codesA Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding TheoryA correction to a code-based blind signature schemeUsing low-density parity-check codes to improve the McEliece cryptosystemAsymptotically efficient lattice-based digital signaturesSquare Code Attack on a Modified Sidelnikov CryptosystemIdentity based identification from algebraic coding theoryAttack on a code-based signature scheme from QC-LDPC codesA new key recovery attack on a code-based signature from the Lyubashevsky frameworkOn codes and learning with errors over function fieldsCode-Based Signature Schemes from Identification Protocols in the Rank MetricA code-based signature scheme from the Lyubashevsky frameworkChosen-ciphertext secure code-based threshold public key encryptions with short ciphertextImproved information set decoding algorithms over Galois ring in the Lee metricAnalysis of (U,U+V)-code problem with Gramian over binary and ternary fieldsStructural attacks for public key cryptosystems based on Gabidulin codesRetracted: Invertible matrices over some quotient rings: identification, generation, and analysisA code-based hybrid signcryption schemeStatistical zero-knowledge and analysis of rank-metric zero-knowledge proofs of knowledgeOn the dimension and structure of the square of the dual of a Goppa codeComputational aspects of retrieving a representation of an algebraic geometry codeAsymptotic behaviour of codes in rank metric over finite fieldsA New Efficient Threshold Ring Signature Scheme Based on Coding TheoryOn the Key-Privacy Issue of McEliece Public-Key EncryptionPublic key compression for constrained linear signature schemesQuantum-assisted QD-CFS signaturesA provably secure short signature scheme based on discrete logarithmsCryptanalysis of a code-based full-time signatureA code-based group signature schemeDAGS: key encapsulation using dyadic GS codesA New Dynamic Code-Based Group Signature SchemeCode-Based Public-Key Cryptosystems and Their ApplicationsA post-quantum UC-commitment scheme in the global random oracle model from code-based assumptionsOn the dimension of the subfield subcodes of 1-point Hermitian codesA Secure and Efficient Code-Based Signature SchemeA CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard ModelAccelerating Signature-Based Broadcast Authentication for Wireless Sensor NetworksSemantic security for the McEliece cryptosystem without random oraclesWild McElieceParallel-CFSCryptanalysis of a rank-based signature with short public keysDecoding One Out of ManyAn Efficient Attack on All Concrete KKS ProposalsMonoidic Codes in CryptographyEnsuring Message Embedding in Wet Paper SteganographyVariant of Niederreiter-based signature scheme for blockchain technologyInvertible matrices over some quotient rings: identification, generation, and analysisComputer algebra tales on Goppa codes and McEliece cryptographyOblivious Transfer Based on the McEliece AssumptionsTowards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature SchemeA Post-quantum Digital Signature Scheme Based on Supersingular IsogeniesThe security of the code-based signature scheme based on the Stern identification protocol




This page was built for publication: