Publisher
Springer Nature Switzerland
Reference39 articles.
1. Alagic, G., et al.: Status report on the second round of the NIST post-quantum cryptography standardization process. US Department of Commerce, NIST 2 (2020)
2. Aragon, N., Dyseryn, V., Gaborit, P., Loidreau, P., Renner, J., Wachter-Zeh, A.: LowMS: a new rank metric code-based KEM without ideal structure. Des. Codes Crypt. 92(4), 1075–1093 (2024)
3. Berlekamp, E., McEliece, R., van Tilborg, H.: On the inherent intractability of certain coding problems. IEEE Trans. Inform. Theory 24(3), 384–386 (1978)
4. Bernstein, D.J., et al.: Classic McEliece: conservative code-based cryptography (2019). https://classic.mceliece.org. Second round submission to the NIST post-quantum cryptography call
5. Lecture Notes in Computer Science;D Bucerzan,2017