Back to Results
First PageMeta Content
Post-quantum cryptography / Cyberwarfare / Applied mathematics / Security / Public-key cryptography / Electronic commerce / McEliece cryptosystem


Toward Secure Implementation of McEliece Decryption Mariya Georgieva1 and Fr´ed´eric de Portzamparc1,2,3,4 Gemalto, 6 rue de la Verrerie 92190, Meudon, France1 INRIA, Paris-Rocquencourt Center2 , UPMC Univ Paris 06, UM
Add to Reading List

Document Date: 2015-03-23 08:28:15


Open Document

File Size: 452,03 KB

Share Result on Facebook

Company

Bernstein / McEliece Public-Key Encryption We / G (x g) S a / Patterson / /

Currency

pence / /

/

IndustryTerm

decryption algorithm / attacks proposed to both decoding algorithms / decryption device / /

Organization

UPMC Univ Paris / /

Person

Mariya Georgieva / /

Position

evaluator / /

Technology

encryption / Niederreiter encryption / decoding algorithms / 7 Algorithm / cryptography / Private key / secret key / public key / decryption algorithm / extended Euclidean algorithm / at recovering the secret key / /

SocialTag