Institute of Mathematics for Industry / Cambridge University / China Scholarship Council / U.S. Securities and Exchange Commission / Japan Society for the Promotion of Science / PPT V / Graduate School / Kyushu University / /
Person
Jean-Charles Faug`ere / Rong Hu / Pierre-Louis Cayrel / Phillip Rogaway / Bob McEliece / Ludovic Perret / O. Rabin / N. Asokan / V / Mohammed Meziani / Kirill Morozov / J. Camenisch / V / /
Position
IND-CPA / /
Product
Galil / Fk2 / /
ProgrammingLanguage
V / /
PublishedMedium
IEEE Transactions on Information Theory / /
RadioStation
Fm 2 / /
Technology
public key infrastructure / code-based verifiable encryption / McEliece Encryption / Encryption algorithm / Randomized McEliece encryption / code-based public key encryption / Plaintext Knowledge Protocol / then use Protocol / Niederreiter encryption / Niederreiter verifiable encryption / decoding algorithm / secret key / polynomialtime algorithm / McEliece public key encryption / PPT algorithms / Niederreiter public key encryption / using Sigma-protocols / pub mT Protocol / public key encryption / Encryption / interactive two-party protocol / cryptography / Symmetric Public-Key Encryption / two-party protocols / Key generation algorithm / public key / McEliece verifiable encryption / V. Verifiable encryption / Deep Space Network / PPK protocol / code-based cryptographic protocols / postquantum public key encryption / 6 Verifiable Encryption / 3 algorithm / Decryption algorithm / digital signature / syndrome decoding algorithm / proposed protocol / /