- Home
- » Tags
- » McEliece cryptosystem
Top View
- Microeliece: Mceliece for Embedded Devices
- Key Distribution for Post Quantum Cryptography Using Physical Unclonable Functions
- An Efficient CCA2-Secure Variant of the Mceliece Cryptosystem in The
- Ephemeral Keys Authenticated with Merkle Trees and Their Use in Iot Applications
- Cryptography in a Post-Quantum World
- Analysis of BCNS and Newhope Key-Exchange Protocols Seyedamirhossein Hesamian University of Wisconsin-Milwaukee
- Software/Hardware Codesign of the Post Quantum Cryptography Algorithm Ntruencrypt Using High-Level Synthesis and Register-Transfer Level Design Methodologies
- An Analysis of Potential Standards for Post-Quantum Cryptosystems
- Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature
- A CCA2 Secure Variant of the Mceliece Cryptosystem Nico Dottling,¨ Rafael Dowsley, Jorn¨ Muller-Quade¨ and Anderson C
- Mceliece As an Alternative Cryptosystem
- Microeliece: Mceliece for Embedded Devices
- Curves, Codes, and Cryptography
- Cryptanalysis of the Original Mceliece Cryptosystem
- Reducing Key Length of the Mceliece Cryptosystem
- Code-Based Cryptography
- New Approach for CCA2-Secure Post-Quantum Cryptosystem Using Knapsack Problem
- Code-Based Pkcs and Their Based Pkcs and Their Code-Based Pkcs
- Attacking and Defending the Mceliece Cryptosystem
- Curriculum Vitae
- Study of Mceliece Cryptosystem
- A Hardware Implementation for Code-Based Post-Quantum Asymmetric Cryptography.∗ Kristjane Koleci1, Marco Baldi2, Maurizio Martina1, and Guido Masera1
- Single Trace Analysis Against Hymes by Exploitation of Joint Distributions of Leakages
- Smaller Keys for Code-Based Cryptography: QC-MDPC Mceliece Implementations on Embedded Devices
- Post-Quantum Cryptography
- Post-Quantum Cryptography Standardization Helen Tera Supervised by Dominique Unruh University of Tartu
- Implementation Attacks on Post-Quantum Cryptographic Schemes
- Quantum-Resistant Cryptography
- Post-Quantum Network Security: Mceliece and Niederreiter Cryptosystems Analysis and Education Issues
- Implementation of Cryptosystem Based on Error-Correcting Codes
- Polynomial Reconstruction Based Cryptography (A Short Survey)
- Numbers AES-GCM Efficiency, 154 0-RITT Data, 245 Internals, 152–153 2G Mobile Communications, 89 Security, 154 3DES (Triple DES), 59, 72–74
- Reducing the Key Size of Mceliece Cryptosystem from Automorphism-Induced Goppa Codes Via Permutations
- Survey of Computational Assumptions Used in Cryptography Broken Or Not by Shor’S Algorithm
- Network Coding-Based Post-Quantum Cryptography
- Cryptanalysis of ITRU
- The Mceliece Public-Keyed Cryptosystem
- Cryptography and Security
- Enhanced Public Key Security for the Mceliece Cryptosystem
- A Summary of Mceliece-Type Cryptosystems and Their Security
- Some Notes on Post-Quantum Cryptanalysis Mårtensson, Erik
- Elliptic Curve Cryptography and Coding Theory
- Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions
- Author Index
- Hybrid Lattices and the NTWO Cryptosystem (Extended Abstract)
- Post-Quantum Cryptography
- Post-Quantum Signatures
- Codes, Cryptography, and the Mceliece Cryptosystem
- The Mceliece Cryptosystem Introduction
- Conservative Code-Based Cryptography 10 October 2020
- On the Theory and Practice of Quantum-Immune Cryptography