Cited in
(only showing first 100 items - show all)- Designing a Public Key Cryptosystem Based on Quasi-cyclic Subspace Subcodes of Reed-Solomon Codes
- On the subfield subcodes of Hermitian codes
- \textit{Encode-then-encrypt}: a novel framework for reliable and secure communication
- Faster 2-regular information-set decoding
- Information-set decoding with hints
- Security analysis of a cryptosystem based on subspace subcodes
- scientific article; zbMATH DE number 2154508 (Why is no real title available?)
- Improvements of algebraic attacks for solving the rank decoding and MinRank problems
- On the design and security of Lee metric McEliece cryptosystems
- Statistical zero-knowledge and analysis of rank-metric zero-knowledge proofs of knowledge
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- Construction of binary Hadamard codes and their \(s\)-PD sets
- LIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decoding
- A code-based signature scheme from the Lyubashevsky framework
- Fast polynomial inversion for post quantum QC-MDPC cryptography
- The rank-based cryptography library
- Properties of constacyclic codes under the Schur product
- Generalization of BJMM-ISD using May-Ozerov nearest neighbor algorithm over an arbitrary finite field \(\mathbb{F}_q\)
- Quantum public-key encryption schemes based on conjugate coding
- On the hardnesses of several quantum decoding problems
- LESS is more: code-based signatures without syndromes
- Classification of Hadamard products of one-codimensional subcodes of Reed-Muller codes
- Invertible matrices over some quotient rings: identification, generation, and analysis
- Goppa codes over the \(p\)-adic integers and integers modulo \(p^e\)
- A digital signature scheme \(\text{mCFS}^{\text{QC-LDPC}}\) based on QC-LDPC codes
- A new approach for finding low-weight polynomial multiples
- CCA secure \textit{a posteriori} openable encryption in the standard model
- Cryptanalysis of a rank-based signature with short public keys
- Algebraic geometry codes and some appliations
- Inner-product functional encryption from random linear codes: trial and challenges
- Cryptanalysis of a code-based full-time signature
- A post-quantum UC-commitment scheme in the global random oracle model from code-based assumptions
- Encryption scheme based on expanded Reed-Solomon codes
- On the dimension of the subfield subcodes of 1-point Hermitian codes
- Mathematical problems in cryptology
- Block encryption of quantum messages
- Cryptanalysis of LEDAcrypt
- An efficient attack on all concrete KKS proposals
- Cryptography with auxiliary input and trapdoor from constant-noise LPN
- Efficient finite field multiplication for isogeny based post quantum cryptography
- An improved algorithm for learning sparse parities in the presence of noise
- Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice
- Silver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codes
- About Low DFR for QC-MDPC Decoding
- Cryptographic one-way function based on boson sampling
- BearSSL
- Deterministic root finding in finite fields
- Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem
- Moderate-density parity-check codes from projective bundles
- A NP-complete problem in coding theory with application to code based cryptography
- Semantic security and indistinguishability in the quantum world
- Monomial codes seen as invariant subspaces
- PQClean
- Structural properties of self-dual monomial codes with application to code-based cryptography
- Systematic encoders for generalized Gabidulin codes and the \(q\)-analogue of Cauchy matrices
- Hash-based signatures revisited: a dynamic FORS with adaptive chosen message security
- McEliece needs a break -- solving McEliece-1284 and quasi-cyclic-2918 with modern ISD
- On the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptography
- A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
- Implementation of McEliece based on quasi-dyadic Goppa codes for embedded devices
- Monoidic codes in cryptography
- Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
- Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x]\) and some cryptographic applications
- A CCA2 Secure Variant of the McEliece Cryptosystem
- Enhanced public key security for the McEliece cryptosystem
- Cryptanalysis of an E0-like combiner with memory
- A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes
- A fuzzy vault scheme
- Column scrambler for the GPT cryptosystem
- Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension
- Reducing Key Length of the McEliece Cryptosystem
- ECC\(^2\): error correcting code and elliptic curve based cryptosystem
- A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
- scientific article; zbMATH DE number 4070796 (Why is no real title available?)
- Structural attacks for public key cryptosystems based on Gabidulin codes
- Decoding one out of many
- scientific article; zbMATH DE number 1618037 (Why is no real title available?)
- On the decoding of binary cyclic codes with the Newton identities
- How to mask the structure of codes for a cryptographic use
- Related-key attack on full-round PICARO
- Quantum McEliece public-key cryptosystem
- New criteria for MRD and Gabidulin codes and some rank-metric code constructions
- M4RI
- NTL
- NAXOS
- QC-LDPC
- LDPC
- HECC
- matrixss
- eBASH
- GUAVA
- mpFq
- AETG
- CFS
- eBACS
- gf2x
- MicroEliece
- Statistics Toolbox
- brnoeth.lib
- SUPERCOP
This page was built for software: McEliece