Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Compact McEliece keys based on quasi-dyadic Srivastava codes
E Persichetti - Journal of Mathematical Cryptology, 2012 - degruyter.com
The McEliece cryptosystem is one of the few systems to be considered secure against
attacks by Quantum computers. The original scheme is built upon Goppa codes and …
attacks by Quantum computers. The original scheme is built upon Goppa codes and …
Structural cryptanalysis of McEliece schemes with compact keys
A very popular trend in code-based cryptography is to decrease the public-key size by
focusing on subclasses of alternant/Goppa codes which admit a very compact public matrix …
focusing on subclasses of alternant/Goppa codes which admit a very compact public matrix …
Folding alternant and Goppa Codes with non-trivial automorphism groups
The main practical limitation of the McEliece public-key encryption scheme is probably the
size of its key. A famous trend to overcome this issue is to focus on subclasses of …
size of its key. A famous trend to overcome this issue is to focus on subclasses of …
Efficient one-time signatures from quasi-cyclic codes: A full treatment
E Persichetti - Cryptography, 2018 - mdpi.com
The design of a practical code-based signature scheme is an open problem in post-quantum
cryptography. This paper is the full version of a work appeared at SIN'18 as a short paper …
cryptography. This paper is the full version of a work appeared at SIN'18 as a short paper …
[PDF][PDF] Improving the efficiency of code-based cryptography
E Persichetti - 2012 - Citeseer
Recent public-key cryptography is largely based on number theory problems, such as
factoring or computing of discrete logarithm. These systems constitute an excellent choice in …
factoring or computing of discrete logarithm. These systems constitute an excellent choice in …
Recent progress in code-based cryptography
PL Cayrel, SM El Yousfi Alaoui, G Hoffmann… - … on Information Security …, 2011 - Springer
The last three years have witnessed tremendous progress in the understanding of code-
based cryptography. One of its most promising applications is the design of cryptographic …
based cryptography. One of its most promising applications is the design of cryptographic …
Monoidic codes in cryptography
Abstract At SAC 2009, Misoczki and Barreto proposed a new class of codes, which have
parity-check matrices that are quasi-dyadic. A special subclass of these codes were shown …
parity-check matrices that are quasi-dyadic. A special subclass of these codes were shown …
Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes
In this paper we present efficient implementations of McEliece variants using quasi-dyadic
codes. We provide secure parameters for a classical McEliece encryption scheme based on …
codes. We provide secure parameters for a classical McEliece encryption scheme based on …
Optimized and scalable co-processor for McEliece with binary Goppa codes
Asymmetric cryptographic primitives are essential to enable secure communications in
public networks or public mediums. Such primitives can be deployed as software libraries or …
public networks or public mediums. Such primitives can be deployed as software libraries or …
Structural weakness of compact variants of the McEliece cryptosystem
The main practical limitation of the McEliece cryptosystem is probably the size of its public-
key. To overcome this issue, a famous trend is to decrease the public-key size by focusing …
key. To overcome this issue, a famous trend is to decrease the public-key size by focusing …