McEliece
From MaRDI portal
Software:14620
swMATH2076MaRDI QIDQ14620FDOQ14620
Author name not available (Why is that?)
Cited In (only showing first 100 items - show all)
- A code-based signature scheme from the Lyubashevsky framework
- Variant of Niederreiter-based signature scheme for blockchain technology
- Moderate-density parity-check codes from projective bundles
- Generalization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field $$\mathbb {F}_q$$
- McEliece Cryptosystem Implementation: Theory and Practice
- Cryptographic one-way function based on boson sampling
- Masking Large Keys in Hardware: A Masked Implementation of McEliece
- An improved algorithm for learning sparse parities in the presence of noise
- Block encryption of quantum messages
- Improvements of algebraic attacks for solving the rank decoding and MinRank problems
- Statistical zero-knowledge and analysis of rank-metric zero-knowledge proofs of knowledge
- Performance bounds for QC-MDPC codes decoders
- Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN
- On the design and security of Lee metric McEliece cryptosystems
- Construction of binary Hadamard codes and their \(s\)-PD sets
- Monomial codes seen as invariant subspaces
- Quantum public-key encryption schemes based on conjugate coding
- Variations of the McEliece cryptosystem
- Efficient Finite Field Multiplication for Isogeny Based Post Quantum Cryptography
- Improved cryptanalysis of rank metric schemes based on Gabidulin codes
- A post-quantum UC-commitment scheme in the global random oracle model from code-based assumptions
- Encryption scheme based on expanded Reed-Solomon codes
- On the dimension of the subfield subcodes of 1-point Hermitian codes
- A digital signature scheme $\mathrm{mCFS}^{\mathrm{QC{-}LDPC}}$ based on $\mathrm{QC}$-$\mathrm{LDPC}$ codes
- Extending Coggia-Couvreur attack on Loidreau's rank-metric cryptosystem
- Mathematical problems in cryptology
- Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes
- TinyKeys: a new approach to efficient multi-party computation
- On extending propelinear structures of the Nordstrom-Robinson code to the Hamming code
- On the subfield subcodes of Hermitian codes
- A rank metric code-based group signature scheme
- More constructions of lossy and correlation-secure trapdoor functions
- LIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decoding
- On the security of a Loidreau rank metric code based encryption scheme
- The rank-based cryptography library
- LESS is More: Code-Based Signatures Without Syndromes
- Statistical Decoding of Codes over $\mathbb{F}_q$
- The Minimum Distance of Some Narrow-Sense Primitive BCH Codes
- Fast polynomial inversion for post quantum QC-MDPC cryptography
- Computational fuzzy extractors
- A reaction attack on the QC-LDPC McEliece cryptosystem
- A pseudorandom number generator based on worst-case lattice problems
- Finding collisions in a quantum world: quantum black-box separation of collision-resistance and one-wayness
- Side Channels in the McEliece PKC
- Modified GPT PKC with right scrambler
- Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice
- Inner-product functional encryption from random linear codes: trial and challenges
- Algebraic geometry codes and some applications
- Semantic Security and Indistinguishability in the Quantum World
- Efficient Compression of SIDH Public Keys
- Detection and recognition of a binary linear code
- Classification of Hadamard products of one-codimensional subcodes of Reed-Muller codes
- Invertible matrices over some quotient rings: identification, generation, and analysis
- Goppa codes over the \(p\)-adic integers and integers modulo \(p^e\)
- Designing a Rank Metric Based McEliece Cryptosystem
- Cryptanalysis of LEDAcrypt
- Effective attack on the McEliece cryptosystem based on Reed-Muller codes
- Using low-density parity-check codes to improve the McEliece cryptosystem
- A lattice-based McEliece scheme for encryption and signature
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptanalysis of a code-based full-time signature
- Not enough less: an improved algorithm for solving code equivalence problems over \(\mathbb{F}_q\)
- Squares of matrix-product codes
- Theory of supports for linear codes endowed with the sum-rank metric
- Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes
- Asymptotic behaviour of codes in rank metric over finite fields
- On quaternary Goppa codes
- Extension of Overbeck's attack for Gabidulin-based cryptosystems
- Coding for locality in reconstructing permutations
- Relationship between codes and idempotents in a dihedral group algebra
- Efficient Implementation of Hybrid Encryption from Coding Theory
- Input-trees of finite automata and application to cryptanalysis
- On the key space of the McEliece cryptosystem based on binary Reed–Muller codes
- Chosen ciphertext attacks on lattice-based public key encryption and modern (non-quantum) cryptography in a quantum environment
- A modified version of the Rao--Nam algebraic-code encryption scheme
- A modified Dual-Ouroboros public-key encryption using Gabidulin codes
- Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem
- Survey of information security
- A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
- A new post-quantum multivariate polynomial public key encapsulation algorithm
- Cryptanalysis of AW digital signature scheme based on error-correcting codes
- Dual-Ouroboros: an improvement of the McNie scheme
- Cryptanalysis of McEliece’s Public-Key Cryptosystem
- SPMH: A solution to the problem of malicious hosts
- New rank codes based encryption scheme using partial circulant matrices
- Two varieties of finite automaton public key cryptosystem and digital signatures
- An approach for stream ciphers design based on joint computing over random and secret data
- The weight distributions of two classes of \(p\)-ary cyclic codes with few weights
- The number of public keys in the McEliece-Sidel'nikov cryptosystem
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
- Attacks and counter-attacks on the GPT public key cryptosystem
- Blind detection of interleaver parameters
- Analysis of Information Set Decoding for a Sub-linear Error Weight
- An Efficient Attack of a McEliece Cryptosystem Variant Based on Convolutional Codes
- A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors
- A new decryption failure attack against HQC
- Separating models of learning with faulty teachers
- Improvement of Lattice-Based Cryptography Using CRT
This page was built for software: McEliece