<--- Back to Details
First PageDocument Content
McEliece cryptosystem / Post-quantum cryptography / Quantum computer / Adaptive chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext / Chosen-ciphertext attack / Cipher / Cryptography / Public-key cryptography / Electronic commerce
Date: 2015-03-02 11:16:55
McEliece cryptosystem
Post-quantum cryptography
Quantum computer
Adaptive chosen-ciphertext attack
Authenticated encryption
RSA
Ciphertext
Chosen-ciphertext attack
Cipher
Cryptography
Public-key cryptography
Electronic commerce

Botan’s Implementation of the McEliece PKC Falko Strenzke cryptosource GmbH December 30, 2014

Add to Reading List

Source URL: www.cryptosource.de

Download Document from Source Website

File Size: 255,08 KB

Share Document on Facebook

Similar Documents

Code-based Cryptography  Christiane Peters Technical University of Denmark  ECC 2011

Code-based Cryptography Christiane Peters Technical University of Denmark ECC 2011

DocID: 1n4uc - View Document

Differential Power Analysis of a McEliece Cryptosystem Cong Chen1 , Thomas Eisenbarth1 , Ingo von Maurich2 , and Rainer Steinwandt3 1  Worcester Polytechnic Institute, Worcester, MA, USA

Differential Power Analysis of a McEliece Cryptosystem Cong Chen1 , Thomas Eisenbarth1 , Ingo von Maurich2 , and Rainer Steinwandt3 1 Worcester Polytechnic Institute, Worcester, MA, USA

DocID: 1ldPH - View Document

An efficient attack of a McEliece cryptosystem variant based on convolutional codes Gregory Landais  Jean-Pierre Tillich

An efficient attack of a McEliece cryptosystem variant based on convolutional codes Gregory Landais Jean-Pierre Tillich

DocID: 1kCqr - View Document

Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1  National Institute of Information and Communications Technology (NICT), Japan

Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1 National Institute of Information and Communications Technology (NICT), Japan

DocID: 1eRpV - View Document

Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1  National Institute of Information and Communications Technology (NICT), Japan

Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1 National Institute of Information and Communications Technology (NICT), Japan

DocID: 1e3Vt - View Document