Niederreiter cryptosystem

Results: 9



#Item
1FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes Wen Wang1, Jakub Szefer1, and Ruben Niederhagen2 1. Yale University, USA 2. Fraunhofer Institute SIT, Germany April 9, 2018

FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes Wen Wang1, Jakub Szefer1, and Ruben Niederhagen2 1. Yale University, USA 2. Fraunhofer Institute SIT, Germany April 9, 2018

Add to Reading List

Source URL: www.math.fau.edu

Language: English - Date: 2018-04-24 10:30:54
    2Noname manuscript No. (will be inserted by the editor) Generalizing Cryptosystems Based on the Subset Sum Problem Aniket Kate · Ian Goldberg

    Noname manuscript No. (will be inserted by the editor) Generalizing Cryptosystems Based on the Subset Sum Problem Aniket Kate · Ian Goldberg

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2011-05-05 15:39:42
    3Smaller Keys for Code-based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices Stefan Heyse, Ingo von Maurich, Tim G¨ uneysu Horst G¨ ortz Institute for IT-Security

    Smaller Keys for Code-based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices Stefan Heyse, Ingo von Maurich, Tim G¨ uneysu Horst G¨ ortz Institute for IT-Security

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-05-04 16:50:34
    4Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke 1  2

    Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke 1 2

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-08-07 11:04:10
    5Reaction Attacks Against Several Public-Key Cryptosystems Chris Hall1 , Ian Goldberg2 , and Bruce Schneier1 1  Counterpane Systems

    Reaction Attacks Against Several Public-Key Cryptosystems Chris Hall1 , Ian Goldberg2 , and Bruce Schneier1 1 Counterpane Systems

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:31
    6Wild McEliece Incognito Daniel J. Bernstein1 , Tanja Lange2 , and Christiane Peters3 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

    Wild McEliece Incognito Daniel J. Bernstein1 , Tanja Lange2 , and Christiane Peters3 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2011-09-15 08:54:20
    7A note on CCA2-protected McEliece cryptosystem with a systematic public key Pavol Zajac? UIM FEI STU, Ilkovicova 3, 81219 Bratislava, Slovakia [removed]

    A note on CCA2-protected McEliece cryptosystem with a systematic public key Pavol Zajac? UIM FEI STU, Ilkovicova 3, 81219 Bratislava, Slovakia [removed]

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-08-22 04:29:49
    8The McEliece Cryptosystem Resists Quantum Fourier Sampling Attack Cristopher Moore University of New Mexico and the Santa Fe Institute Joint work with

    The McEliece Cryptosystem Resists Quantum Fourier Sampling Attack Cristopher Moore University of New Mexico and the Santa Fe Institute Joint work with

    Add to Reading List

    Source URL: tuvalu.santafe.edu

    Language: English - Date: 2011-04-14 11:01:36
    9SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks[removed]Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: [removed]sec.274 RESEARCH ARTICLE

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks[removed]Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: [removed]sec.274 RESEARCH ARTICLE

    Add to Reading List

    Source URL: bbcr.uwaterloo.ca

    Language: English - Date: 2011-07-16 17:53:26