<--- Back to Details
First PageDocument Content
Cryptography / Post-quantum cryptography / Coding theory / McEliece cryptosystem / Linear code / Generator matrix / Ciphertext / Index of cryptography articles / Niederreiter cryptosystem
Date: 2018-10-01 09:10:11
Cryptography
Post-quantum cryptography
Coding theory
McEliece cryptosystem
Linear code
Generator matrix
Ciphertext
Index of cryptography articles
Niederreiter cryptosystem

Security concept: Lock on digital screen

Add to Reading List

Source URL: nis-summer-school.enisa.europa.eu

Download Document from Source Website

File Size: 2,35 MB

Share Document on Facebook

Similar Documents

Code-based Cryptography  Christiane Peters Technical University of Denmark  ECC 2011

Code-based Cryptography Christiane Peters Technical University of Denmark ECC 2011

DocID: 1n4uc - View Document

Differential Power Analysis of a McEliece Cryptosystem Cong Chen1 , Thomas Eisenbarth1 , Ingo von Maurich2 , and Rainer Steinwandt3 1  Worcester Polytechnic Institute, Worcester, MA, USA

Differential Power Analysis of a McEliece Cryptosystem Cong Chen1 , Thomas Eisenbarth1 , Ingo von Maurich2 , and Rainer Steinwandt3 1 Worcester Polytechnic Institute, Worcester, MA, USA

DocID: 1ldPH - View Document

An efficient attack of a McEliece cryptosystem variant based on convolutional codes Gregory Landais  Jean-Pierre Tillich

An efficient attack of a McEliece cryptosystem variant based on convolutional codes Gregory Landais Jean-Pierre Tillich

DocID: 1kCqr - View Document

Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1  National Institute of Information and Communications Technology (NICT), Japan

Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1 National Institute of Information and Communications Technology (NICT), Japan

DocID: 1eRpV - View Document

Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1  National Institute of Information and Communications Technology (NICT), Japan

Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1 National Institute of Information and Communications Technology (NICT), Japan

DocID: 1e3Vt - View Document