Author:
Roth Johannes,Karatsiolis Evangelos,Krämer Juliane
Publisher
Springer International Publishing
Reference20 articles.
1. Augot, D., et al.: Initial recommendations of long-term secure post-quantum systems (2015)
2. Baldi, M., Bodrato, M., Chiaraluce, F.: A new analysis of the McEliece cryptosystem based on QC-LDPC codes. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) Security and Cryptography for Networks, pp. 246–262. Springer, Berlin Heidelberg (2008)
3. Baldi, M., Santini, P., Chiaraluce, F.: Soft McEliece: MDPC code-based McEliece cryptosystems with very compact keys through real-valued intentional errors. In: Proceedings of the IEEE International Symposium on Information Theory (ISIT 2016), pp. 795–799, July 2016. https://doi.org/10.1109/ISIT.2016.7541408
4. Bernstein, D., et al.: Classic McEliece Supporting Documentation (2019)
5. Bernstein, D.J., Lange, T.: McTiny: fast high-confidence post-quantum key erasure for tiny network servers. Cryptology ePrint Archive, Report 2019/1395 (2019). https://eprint.iacr.org/2019/1395
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Lattice-based Multisignature Optimization for RAM Constrained Devices;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. Optimised AES with RISC-V Vector Extensions;2024 27th International Symposium on Design & Diagnostics of Electronic Circuits & Systems (DDECS);2024-04-03
3. A Safety-Critical, RISC-V SoC Integrated and ASIC-Ready Classic McEliece Accelerator;Lecture Notes in Computer Science;2024
4. A Primer on Underwater Quantum Key Distribution;Quantum Engineering;2023-12-23
5. Punctured Syndrome Decoding Problem;Constructive Side-Channel Analysis and Secure Design;2023