Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A NP-Complete Problem in Coding Theory with Application to Code Based Cryptography., , and . C2SI, volume 10194 of Lecture Notes in Computer Science, page 230-237. Springer, (2017)On the Performance and Security of Multiplication in GF(2N)., , , , , , , , and . Cryptogr., 2 (3): 25 (2018)Generalized Subspace Subcodes With Application in Cryptology., , and . IEEE Trans. Inf. Theory, 65 (8): 4641-4657 (2019)Efficient Implementation of Hybrid Encryption from Coding Theory., , , , and . C2SI, volume 10194 of Lecture Notes in Computer Science, page 254-264. Springer, (2017)Software Implementation of a Code-Based Key Encapsulation Mechanism from Binary QD Generalized Srivastava Codes., , , , , , and . CBCrypto, volume 13839 of Lecture Notes in Computer Science, page 77-89. Springer, (2022)Quasi-Dyadic Girault Identification Scheme., , , and . C2SI, volume 11445 of Lecture Notes in Computer Science, page 307-321. Springer, (2019)Security Analysis of a Cryptosystem Based on Subspace Subcodes., , , , , , , and . CBCrypto, volume 13150 of Lecture Notes in Computer Science, page 42-59. Springer, (2021)Generalization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field F_q., , and . C2SI, volume 10194 of Lecture Notes in Computer Science, page 96-109. Springer, (2017)DAGS: Reloaded Revisiting Dyadic Key Encapsulation., , , , , , , , , and 3 other author(s). CBC, volume 11666 of Lecture Notes in Computer Science, page 69-85. Springer, (2019)Improvement of Binary and Non Binary Statistical Decoding Algorithm., , , , and . ICISC, volume 11975 of Lecture Notes in Computer Science, page 194-207. Springer, (2019)