Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Concatenated Structure of a Linear Code.. Appl. Algebra Eng. Commun. Comput., 9 (3): 221-242 (1998)Code-Based Cryptography: State of the Art and Perspectives.. IEEE Secur. Priv., 15 (4): 44-50 (2017)A new signature scheme based on (U|U+V) codes., , and . IACR Cryptology ePrint Archive, (2017)HAVEGE: A user-level software heuristic for generating empirically strong random numbers., and . ACM Trans. Model. Comput. Simul., 13 (4): 334-346 (2003)Analysis of Information Set Decoding for a Sub-linear Error Weight., and . PQCrypto, volume 9606 of Lecture Notes in Computer Science, page 144-161. Springer, (2016)Code-Based Cryptography.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Editorial: Special issue on coding and cryptography., , , , and . Des. Codes Cryptogr., 82 (1-2): 1-2 (2017)Implementing CFS., and . INDOCRYPT, volume 7668 of Lecture Notes in Computer Science, page 474-488. Springer, (2012)On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders., and . PQCrypto, volume 11505 of Lecture Notes in Computer Science, page 404-416. Springer, (2019)The tightness of security reductions in code-based cryptography.. ITW, page 415-419. IEEE, (2011)