Author of the publication

On the Computational Hardness of the Code Equivalence Problem in Cryptography.

, , , and . IACR Cryptol. ePrint Arch., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure and Anonymous Hybrid Encryption from Coding Theory.. PQCrypto, volume 7932 of Lecture Notes in Computer Science, page 174-187. Springer, (2013)On the Applicability of the Fujisaki-Okamoto Transformation to the BIKE KEM., , , and . IACR Cryptol. ePrint Arch., (2020)On the Computational Hardness of the Code Equivalence Problem in Cryptography., , , and . IACR Cryptol. ePrint Arch., (2022)A Note on Non-Interactive Key Exchange from Code Equivalence., , , and . IACR Cryptol. ePrint Arch., (2021)DAGS: Key encapsulation using dyadic GS codes., , , , , , , , , and 3 other author(s). J. Math. Cryptol., 12 (4): 221-239 (2018)Cryptanalysis of a Code-Based Signature Scheme Based on the Schnorr-Lyubashevsky Framework., , , and . IEEE Commun. Lett., 25 (9): 2829-2833 (2021)Designing Efficient Dyadic Operations for Cryptographic Applications., , , and . IACR Cryptology ePrint Archive, (2018)Efficient Digital Signatures From Coding Theory.. IACR Cryptology ePrint Archive, (2017)Reproducible Codes and Cryptographic Applications., , and . IACR Cryptology ePrint Archive, (2018)Code-Based Public-Key Encryption Resistant to Key Leakage.. CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 44-54. Springer, (2013)