Shehhi et al., 2019
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Aguilar-Melchor et al. | Efficient encryption from random quasi-cyclic codes | |
| Aggarwal et al. | A new public-key cryptosystem via Mersenne numbers | |
| Deneuville et al. | Ouroboros: A simple, secure and efficient key exchange protocol based on coding theory | |
| Daemen et al. | Xoodoo cookbook | |
| Aguilar et al. | Efficient encryption from random quasi-cyclic codes | |
| Hooshmand et al. | PKC‐PC: a variant of the McEliece public‐key cryptosystem based on polar codes | |
| Lau et al. | Key recovery attack on McNie based on low rank parity check codes and its reparation | |
| Wang | Rlcekeyencapsulation mechanism (rlce-kem) specifcation | |
| Kim et al. | PALOMA: binary separable Goppa-based KEM | |
| Lau et al. | New rank codes based encryption scheme using partial circulant matrices | |
| Shehhi et al. | An IND-CCA-secure code-based encryption scheme using rank metric | |
| Damgård et al. | How practical is public-key encryption based on LPN and ring-LPN? | |
| Barreto et al. | Quasi-dyadic CFS signatures | |
| Li et al. | On the bounded distance decoding problem for lattices constructed and their cryptographic applications | |
| Lee et al. | Ciphertext-only attack on linear feedback shift register-based Esmaeili-Gulliver cryptosystem | |
| Dai et al. | Super-linear time-memory trade-offs for symmetric encryption | |
| Kindberg | A usability study of post-quantum algorithms | |
| Esfahani | Generalizations of All-or-Nothing Transforms and their Application in Secure Distributed Storage. | |
| Lau et al. | A new Gabidulin-like code and its application in cryptography | |
| Döttling et al. | Rate-1 trapdoor functions from the Diffie-Hellman problem | |
| Cayrel et al. | Efficient implementation of hybrid encryption from coding theory | |
| Kratochvíl | Implementation of cryptosystem based on error-correcting codes | |
| González de la Torre et al. | About the Fujisaki-Okamoto transformation in the code-based algorithms of the NIST post-quantum call | |
| Kim et al. | A new LRPC-Kronecker product codes based public-key cryptography | |
| Güzeltepe et al. | Skew‐cyclic codes based public‐key cryptosystem approach |