Publisher
Springer Nature Switzerland
Reference39 articles.
1. Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20-22 November 1994, pp. 124–134. IEEE Computer Society (1994). https://doi.org/10.1109/SFCS.1994.365700
2. National Institute of Standards and Technology (NIST). Announcing Request for Nominations for Public-Key Post-Quantum Cryptographic Algorithms. Federal Register 81(244), 92787–92788 (2016). https://federalregister.gov/a/2016-30615
3. National Institute of Standards and Technology (NIST). Call for Additional Digital Signature Schemes for the Post-Quantum Cryptography Standardization Process (2022). https://csrc.nist.gov/csrc/media/Projects/pqc-dig-sig/documents/call-for-proposals-dig-sig-sept-2022.pdf
4. Prange, E.: The use of information sets in decoding cyclic codes. IEEE Trans. Inf. Theory 8(5), 5–9 (1962). https://doi.org/10.1109/TIT.1962.1057777, http://ieeexplore.ieee.org/document/1057777/. ISSN: 0018-9448. Accessed 08 Sept 2020
5. Lee, P.J., Brickell, E.F.: An observation on the security of McEliece’s public-key cryptosystem. In: Barstow, D., et al. (eds.) EUROCRYPT 1988. LNCS, vol. 330, pp. 275–280. Springer, Heidelberg (1988). https://doi.org/10.1007/3-540-45961-8_25. Accessed 08 Sept 2020