<--- Back to Details
First PageDocument Content
Cryptography / Post-quantum cryptography / Coding theory / McEliece cryptosystem / Linear code / Generator matrix / Ciphertext / Index of cryptography articles / Niederreiter cryptosystem
Date: 2018-10-01 09:10:11
Cryptography
Post-quantum cryptography
Coding theory
McEliece cryptosystem
Linear code
Generator matrix
Ciphertext
Index of cryptography articles
Niederreiter cryptosystem

Security concept: Lock on digital screen

Add to Reading List

Source URL: nis-summer-school.enisa.europa.eu

Download Document from Source Website

File Size: 2,35 MB

Share Document on Facebook

Similar Documents

Cryptography / IMessage / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Attack model / Padding oracle attack / RSA / Messages / Block cipher mode of operation / ICloud / Authenticated encryption / Symmetric-key algorithm

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

DocID: 1xVFh - View Document

Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† Abstract

DocID: 1uJpL - View Document

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

DocID: 1tQVA - View Document

Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ Abstract

DocID: 1tqoX - View Document