Author of the publication

QcBits: Constant-Time Small-Key Code-Based Cryptography.

. CHES, volume 9813 of Lecture Notes in Computer Science, page 280-300. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reducing Signature Size of Matrix-Code-Based Signature Schemes., , , and . PQCrypto (1), volume 14771 of Lecture Notes in Computer Science, page 107-134. Springer, (2024)Fast Exhaustive Search for Polynomial Systems in F2., , , , , and . IACR Cryptology ePrint Archive, (2010)QcBits: Constant-Time Small-Key Code-Based Cryptography.. CHES, volume 9813 of Lecture Notes in Computer Science, page 280-300. Springer, (2016)Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs., , , , and . WISA, volume 7690 of Lecture Notes in Computer Science, page 28-42. Springer, (2012)Classic McEliece on the ARM Cortex-M4., and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (3): 125-148 (2021)QcBits: Constant-Time Small-Key Code-Based Cryptography.. IACR Cryptology ePrint Archive, (2019)An IND-CCA2 Attack Against the 1st- and 2nd-Round Versions of NTS-KEM.. SECITC, volume 12596 of Lecture Notes in Computer Science, page 165-184. Springer, (2020)The Simplest Protocol for Oblivious Transfer., and . LATINCRYPT, volume 9230 of Lecture Notes in Computer Science, page 40-58. Springer, (2015)Fast Exhaustive Search for Quadratic Systems in $$F_2$$ on FPGAs., , , , and . Selected Areas in Cryptography, volume 8282 of Lecture Notes in Computer Science, page 205-222. Springer, (2013)Take Your MEDS: Digital Signatures from Matrix Code Equivalence., , , , , , and . AFRICACRYPT, volume 14064 of Lecture Notes in Computer Science, page 28-52. Springer, (2023)