Author:
Dinh Hang,Moore Cristopher,Russell Alexander
Publisher
Springer Berlin Heidelberg
Reference26 articles.
1. Lecture Notes in Computer Science;D.J. Bernstein,2008
2. Courtois, N., Finiasz, M., Sendrier, N.: How to achieve a mcEliece-based digital signature scheme. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 157–174. Springer, Heidelberg (2001)
3. Dinh, H., Moore, C., Russell, A.: The McEliece cryptosystem resists quantum Fourier sampling attacks, preprint (2010),
http://arxiv.org/abs/1008.2390
4. Engelbert, D., Overbeck, R., Schmidt, A.: A summary of McEliece-type cryptosystems and their security. J. Math. Crypt. 1, 151–199 (2007)
5. Fulton, W., Harris, J.: Representation Theory - A First Course. Springer-Verlag, New York Inc., Heidelberg (1991)
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An approach for designing fast public key encryption systems using white-box cryptography techniques;Journal of Computer Virology and Hacking Techniques;2024-02-10
2. Finding Enumerators for Generalized (L, G)-Code;Automatic Control and Computer Sciences;2023-12
3. Metaverse Security and Privacy: An Overview;2022 IEEE International Conference on Big Data (Big Data);2022-12-17
4. A Study of Post Quantum Cipher Suites for Key Exchange;2021 IEEE International Symposium on Technologies for Homeland Security (HST);2021-11-08
5. Modification and Software Implementation of Mceliece Cryptosystem;XIV International Scientific Conference “INTERAGROMASH 2021";2021-10-31