Pages that link to "Item:Q1009060"
From MaRDI portal
The following pages link to Semantic security for the McEliece cryptosystem without random oracles (Q1009060):
Displaying 27 items.
- Strongly secure authenticated key exchange from factoring, codes, and lattices (Q494585) (← links)
- DAGS: key encapsulation using dyadic GS codes (Q1755960) (← links)
- LIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decoding (Q2034992) (← links)
- Group encryption: full dynamicity, message filtering and code-based instantiation (Q2061981) (← links)
- CCA secure \textit{a posteriori} openable encryption in the standard model (Q2152171) (← links)
- A rank metric code-based group signature scheme (Q2163756) (← links)
- Amount of key information contained in plain and encrypted text sets of the symmetric randomized McEliece cryptosystem (Q2215846) (← links)
- Using low-density parity-check codes to improve the McEliece cryptosystem (Q2658068) (← links)
- Differential Power Analysis of a McEliece Cryptosystem (Q2794516) (← links)
- Weaknesses in Two RFID Authentication Protocols (Q2947080) (← links)
- Semantic Security and Key-Privacy with Random Split of St-Gen Codes (Q3188246) (← links)
- Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model (Q3195263) (← links)
- A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model (Q3623048) (← links)
- (Q4417420) (← links)
- Code-Based Public-Key Cryptosystems and Their Applications (Q4931667) (← links)
- On the Berger - Loidreau Cryptosystem on the Tensor Product of Codes (Q4972204) (← links)
- IND-CCA2 secure McEliece-type modification in the standard model (Q5071466) (← links)
- ON THE CONSTRUCTION OF A SEMANTICALLY SECURE MODIFICATION OF THE MCELIECE CRYPTOSYSTEM (Q5151274) (← links)
- On the Key-Privacy Issue of McEliece Public-Key Encryption (Q5386092) (← links)
- Oblivious Transfer Based on the McEliece Assumptions (Q5502796) (← links)
- How to backdoor (classic) McEliece and how to guard against backdoors (Q6111574) (← links)
- A new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channels (Q6113961) (← links)
- Code-based secret handshake scheme, revisited (Q6550613) (← links)
- Group encryption: full dynamicity, message filtering and code-based instantiation (Q6564029) (← links)
- On two modifications of the McEliece PKE and the CFS signature scheme (Q6569889) (← links)
- Post-quantum secure fully-dynamic logarithmic-size deniable group signature in code-based setting (Q6584313) (← links)
- Short code-based one-out-of-many proofs and applications (Q6635777) (← links)