Secure and anonymous hybrid encryption from coding theory
From MaRDI portal
Publication:4928596
DOI10.1007/978-3-642-38616-9_12zbMATH Open1306.94085OpenAlexW2130572351MaRDI QIDQ4928596FDOQ4928596
Authors: Edoardo Persichetti
Publication date: 14 June 2013
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-38616-9_12
Recommendations
- A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting
- CCA2 key-privacy for code-based encryption in the standard model
- Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model
- Efficient implementation of hybrid encryption from coding theory
- An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model
Cited In (11)
- Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model
- Some (in)sufficient conditions for secure hybrid encryption
- Post-quantum cryptography: state of the art
- A General Cipher for Individual Data Anonymization
- Anonymous, robust post-quantum public key encryption
- Efficient implementation of hybrid encryption from coding theory
- CCA2 key-privacy for code-based encryption in the standard model
- A code-based hybrid signcryption scheme
- Title not available (Why is that?)
- A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting
- DAGS: key encapsulation using dyadic GS codes
This page was built for publication: Secure and anonymous hybrid encryption from coding theory
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4928596)