Improving the Security of the McEliece Public-Key Cryptosystem
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Computer Networks: The International Journal of Computer and Telecommunications Networking
Extending tamper-proof hardware security to untrusted execution environments
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
On the design of error-correcting ciphers
EURASIP Journal on Wireless Communications and Networking
A novel distributed privacy paradigm for visual sensor networks based on sharing dynamical systems
EURASIP Journal on Applied Signal Processing
McEliece Cryptosystem Implementation: Theory and Practice
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
IEICE - Transactions on Information and Systems
ECC-based lightweight authentication protocol with untraceability for low-cost RFID
Journal of Parallel and Distributed Computing
The future of high-speed cryptography: new computing platforms and new ciphers
Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI
Smaller decoding exponents: ball-collision decoding
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
Designing an efficient and secure public-key cryptosystem based on reducible rank codes
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
High diffusion cipher: encryption and error correction in a single cryptographic primitive
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Quantum McEliece public-key cryptosystem
Quantum Information & Computation
An efficient IND-CCA2 secure variant of the niederreiter encryption scheme in the standard model
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Hi-index | 0.01 |