About 71 results
Open links in new tab
  1. Code-based public-key cryptography

    Advances in Cryptology – ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4–8, 2011, …

  2. Conferences - PQCrypto

    #4: PQCrypto 2011. Taipei, Taiwan, November 29–December 2, 2011. https://troll.iis.sinica.edu.tw/pqc11/. #3: PQCrypto 2010. Darmstadt (close to Frankfurt), Germany, …

  3. Workshops - PQCrypto

    Quantum Cryptanalysis. Schloss Dagstuhl, Germany, September 8–13, 2013. Post-Quantum Cryptography and Quantum Algorithms, Leiden, the Netherlands, November 5–9, 2012. Quantum …

  4. Distinguisher for High Rate McEliece Cryptosystems (ITW 2011). Faugere, Gauthier, Otmani, Perret and Tillich Introduced in 2001 by Courtois, Finiasz, and Sendrier to formalize a security proof of the …

  5. [PPT]

    Slide 1

    Jan 18, 2023 · Author Tanya Brewer Created Date 07/20/2011 08:01:20 Title Slide 1 Last modified by

  6. Mar 26, 2025 · The project starts in 2011 – 2012 timeframe with an NRC post doc announcement. 2015 we made substantial move. 2016 we made an important decision (NISTIR 8105, announce the …

  7. Adopting the approach developed by Mesnager [Mesnager 2010], Wang et al. [Wang-Tang-Qi-Yang-Xu 2011] studied in late 2011 the following family with an additional trace term on F16 :

  8. Jan 24, 2024 · Example Sizes: Public key 28300 bits, Signature 8640 bits, 128 bits of security Low Rank High Rank H= Stern/Cayrel (Stern 1993) (Cayrel, Veron, Alaoui 2011) Uses Fiat-Shamir instead of …

  9. [PDF]

    CBC2012

    [Dinh, Moore, Russell, Preprint 2011 , arXiv:1111.4382] Shor‐like algorithms are unlikely to help break code‐based cryptosystems in these cases.

  10. Intrinsic problem 2 : the scheme is linear : makes attacks more e ective The weight of the signature is controlled by the fact that G has weight at most n0 (n average n'/2) recent attack Otmani-Tillich (PQC …