<--- Back to Details
First PageDocument Content
Cryptography / Post-quantum cryptography / Coding theory / McEliece cryptosystem / Linear code / Generator matrix / Ciphertext / Index of cryptography articles / Niederreiter cryptosystem
Date: 2018-10-01 09:10:11
Cryptography
Post-quantum cryptography
Coding theory
McEliece cryptosystem
Linear code
Generator matrix
Ciphertext
Index of cryptography articles
Niederreiter cryptosystem

Security concept: Lock on digital screen

Add to Reading List

Source URL: nis-summer-school.enisa.europa.eu

Download Document from Source Website

File Size: 2,35 MB

Share Document on Facebook

Similar Documents

FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes Wen Wang1, Jakub Szefer1, and Ruben Niederhagen2 1. Yale University, USA 2. Fraunhofer Institute SIT, Germany April 9, 2018

DocID: 1ufAq - View Document

Security / Paillier cryptosystem / Merkle–Hellman knapsack cryptosystem / Niederreiter cryptosystem / Cryptography / Post-quantum cryptography / Cryptosystem / RSA / Semantic security / Public-key cryptography / Cyberwarfare / Applied mathematics

Noname manuscript No. (will be inserted by the editor) Generalizing Cryptosystems Based on the Subset Sum Problem Aniket Kate · Ian Goldberg

DocID: 19CfC - View Document

Information theory / Mathematics / Low-density parity-check code / Reed–Solomon error correction / Niederreiter cryptosystem / McEliece cryptosystem / Parity-check matrix / Hamming / Linear code / Coding theory / Cryptography / Error detection and correction

Smaller Keys for Code-based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices Stefan Heyse, Ingo von Maurich, Tim G¨ uneysu Horst G¨ ortz Institute for IT-Security

DocID: 12Yfz - View Document

Coding theory / Error detection and correction / Theoretical computer science / Numerical analysis / McEliece cryptosystem / Post-quantum cryptography / Niederreiter cryptosystem / List decoding / Horner scheme / Mathematics / Public-key cryptography / Applied mathematics

Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke 1 2

DocID: 12M4t - View Document

McEliece cryptosystem / Post-quantum cryptography / Ciphertext / Chosen-ciphertext attack / RSA / Lattice problem / Cryptanalysis / Niederreiter cryptosystem / Rabin cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Reaction Attacks Against Several Public-Key Cryptosystems Chris Hall1 , Ian Goldberg2 , and Bruce Schneier1 1 Counterpane Systems

DocID: 11Vbg - View Document