-
1
-
-
56749156338
-
McEliece cryptosystem implementation: Theory and practice
-
Buchmann, J., Ding, J. (eds.), Springer, Heidelberg
-
Biswas, B., Sendrier, N.: McEliece cryptosystem implementation: theory and practice. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 47–62. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-88403-3 4
-
(2008)
Pqcrypto 2008. LNCS
, vol.5299
, pp. 47-62
-
-
Biswas, B.1
Sendrier, N.2
-
2
-
-
84866481430
-
A CCA2 secure variant of the McEliece cryptosystem
-
Döttling, N., Dowsley, R., Müller-Quade, J., Nascimento, A.C.: A CCA2 secure variant of the McEliece cryptosystem. IEEE Trans. Inf. Theory 58(10), 6672–6680 (2012)
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.10
, pp. 6672-6680
-
-
Döttling, N.1
Dowsley, R.2
Müller-Quade, J.3
Nascimento, A.C.4
-
3
-
-
67650102558
-
A CCA2 secure public key encryption scheme based on the mceliece assumptions in the standard model
-
Fischlin, M. (ed.), Springer, Heidelberg
-
Dowsley, R., Müller-Quade, J., Nascimento, A.C.A.: A CCA2 secure public key encryption scheme based on the mceliece assumptions in the standard model. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 240–251. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00862-7 16
-
(2009)
CT-RSA 2009. LNCS
, vol.5473
, pp. 240-251
-
-
Dowsley, R.1
Müller-Quade, J.2
Nascimento, A.C.A.3
-
4
-
-
83655202691
-
A distinguisher for high rate McEliece cryptosystems
-
October
-
Faugère, J.-C., Gauthier-Umaña, V., Otmani, A., Perret, L., Tillich, J.-P.: A distinguisher for high rate McEliece cryptosystems. In: 2011 IEEE Information Theory Workshop (ITW), pp. 282–286, October 2011
-
(2011)
2011 IEEE Information Theory Workshop (ITW)
, pp. 282-286
-
-
Faugère, J.-C.1
Gauthier-Umaña, V.2
Otmani, A.3
Perret, L.4
Tillich, J.-P.5
-
5
-
-
84947905764
-
An efficient pseudo-random generator provably as secure as syndrome decoding
-
Maurer, U. (ed.), Springer, Heidelberg
-
Fischer, J.-B., Stern, J.: An efficient pseudo-random generator provably as secure as syndrome decoding. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 245–255. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68339-9 22
-
(1996)
EUROCRYPT 1996. LNCS
, vol.1070
, pp. 245-255
-
-
Fischer, J.-B.1
Stern, J.2
-
6
-
-
79955545739
-
More constructions of lossy and correlation-secure trapdoor functions
-
Nguyen, P.Q., Pointcheval, D. (eds.), Springer, Heidelberg
-
Freeman, D.M., Goldreich, O., Kiltz, E., Rosen, A., Segev, G.: More constructions of lossy and correlation-secure trapdoor functions. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 279–295. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13013-7 17
-
(2010)
PKC 2010. LNCS
, vol.6056
, pp. 279-295
-
-
Freeman, D.M.1
Goldreich, O.2
Kiltz, E.3
Rosen, A.4
Segev, G.5
-
7
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Wiener, M. (ed.), Springer, Heidelberg
-
Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537–554. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1 34
-
(1999)
CRYPTO 1999. LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
8
-
-
84937393537
-
Semantically secure McEliece public-key cryptosystems-conversions for McEliece PKC
-
Kim, K. (ed.), Springer, Heidelberg
-
Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems-conversions for McEliece PKC. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 19–35. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44586-2 2
-
(2001)
PKC 2001. LNCS
, vol.1992
, pp. 19-35
-
-
Kobara, K.1
Imai, H.2
-
9
-
-
0028294826
-
On the equivalence of McEliece’s and Nieder-reiter’s public-key cryptosystems
-
Li, Y.X., Deng, R.H., Wang, X.M.: On the equivalence of McEliece’s and Nieder-reiter’s public-key cryptosystems. IEEE Trans. Inf. Theory 40(1), 271–273 (1994)
-
(1994)
IEEE Trans. Inf. Theory
, vol.40
, Issue.1
, pp. 271-273
-
-
Li, Y.X.1
Deng, R.H.2
Wang, X.M.3
-
10
-
-
84864818403
-
An efficient IND-CCA2 secure variant of the niederreiter encryption scheme in the standard model
-
Susilo, W., Mu, Y., Seberry, J. (eds.), Springer, Heidelberg
-
Preetha Mathew, K., Vasant, S., Venkatesan, S., Pandu Rangan, C.: An efficient IND-CCA2 secure variant of the niederreiter encryption scheme in the standard model. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol. 7372, pp. 166–179. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31448-3 13
-
(2012)
ACISP 2012. LNCS
, vol.7372
, pp. 166-179
-
-
Preetha Mathew, K.1
Vasant, S.2
Venkatesan, S.3
Pandu Rangan, C.4
-
11
-
-
0002448405
-
A public-key cryptosystem based on algebraic coding theory
-
McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Deep Space Netw. Progress Rep. 44, 114–116 (1978)
-
(1978)
Deep Space Netw. Progress Rep.
, vol.44
, pp. 114-116
-
-
McEliece, R.J.1
-
12
-
-
0022582790
-
Knapsack-type cryptosystems and algebraic coding theory
-
Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Prob. Control Inf. Theory 15(2), 159–166 (1986)
-
(1986)
Prob. Control Inf. Theory
, vol.15
, Issue.2
, pp. 159-166
-
-
Niederreiter, H.1
-
13
-
-
51349142711
-
Semantic security for the McEliece cryptosystem without random oracles
-
Nojima, R., Imai, H., Kobara, K., Morozov, K.: Semantic security for the McEliece cryptosystem without random oracles. Des. Codes Cryptogr. 49(1–3), 289–305 (2008)
-
(2008)
Des. Codes Cryptogr.
, vol.49
, Issue.1-3
, pp. 289-305
-
-
Nojima, R.1
Imai, H.2
Kobara, K.3
Morozov, K.4
-
14
-
-
85055706395
-
On a CCA2-secure variant of McEliece in the standard model
-
Persichetti, E.: On a CCA2-secure variant of McEliece in the standard model. IACR Cryptology ePrint Archive 2012:268 (2012)
-
(2012)
IACR Cryptology Eprint Archive
, vol.2012
, pp. 268
-
-
Persichetti, E.1
-
15
-
-
84884495820
-
Secure and anonymous hybrid encryption from coding theory
-
Gaborit, P. (ed.), Springer, Heidelberg
-
Persichetti, E.: Secure and anonymous hybrid encryption from coding theory. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 174–187. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38616-9 12
-
(2013)
Pqcrypto 2013. LNCS
, vol.7932
, pp. 174-187
-
-
Persichetti, E.1
-
16
-
-
67650674979
-
Chosen-ciphertext security via correlated products
-
Reingold, O. (ed.), Springer, Heidelberg
-
Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 419–436. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00457-5 25
-
(2009)
TCC 2009. LNCS
, vol.5444
, pp. 419-436
-
-
Rosen, A.1
Segev, G.2
-
17
-
-
77954406052
-
A timing attack against the secret permutation in the McEliece PKC
-
Sendrier, N. (ed.), Springer, Heidelberg
-
Strenzke, F.: A timing attack against the secret permutation in the McEliece PKC. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol. 6061, pp. 95–107. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-12929-2 8
-
(2010)
Pqcrypto 2010. LNCS
, vol.6061
, pp. 95-107
-
-
Strenzke, F.1
-
18
-
-
56749169082
-
Side channels in the McEliece PKC
-
Buchmann, J., Ding, J. (eds.), Springer, Heidelberg
-
Strenzke, F., Tews, E., Molter, H.G., Overbeck, R., Shoufan, A.: Side channels in the McEliece PKC. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 216–229. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-88403-3 15
-
(2008)
Pqcrypto 2008. LNCS
, vol.5299
, pp. 216-229
-
-
Strenzke, F.1
Tews, E.2
Molter, H.G.3
Overbeck, R.4
Shoufan, A.5
-
19
-
-
85021726361
-
CCA2 key-privacy for code-based encryption in the standard model
-
Lange, T., Takagi, T. (eds.), Springer, Cham
-
Yoshida, Y., Morozov, K., Tanaka, K.: CCA2 key-privacy for code-based encryption in the standard model. In: Lange, T., Takagi, T. (eds.) PQCrypto 2017. LNCS, vol. 10346, pp. 35–50. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59879-6 3
-
(2017)
Pqcrypto 2017. LNCS
, vol.10346
, pp. 35-50
-
-
Yoshida, Y.1
Morozov, K.2
Tanaka, K.3
|