Author of the publication

Semantic security for the McEliece cryptosystem without random oracles.

, , , and . Des. Codes Cryptogr., 49 (1-3): 289-305 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Error-correcting codes and cryptography., and . Appl. Algebra Eng. Commun. Comput., 19 (3): 213-228 (2008)On advanced cryptographic techniques for information security of smart grid AMI., , , , and . CSIIRW, page 64. ACM, (2011)Relation between XL algorithm and Gröbner Bases Algorithms., , and . IACR Cryptology ePrint Archive, (2004)On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?, , , and . IACR Cryptology ePrint Archive, (2003)An improvement of discrete Tardos fingerprinting codes., , , , , , and . IACR Cryptology ePrint Archive, (2008)A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange., , and . EuroPKI, volume 3545 of Lecture Notes in Computer Science, page 191-205. Springer, (2005)Chosen Ciphertext Secure Public Key Encryption with a Simple Structure., , , and . IWSEC, volume 5312 of Lecture Notes in Computer Science, page 20-33. Springer, (2008)Comparing the MOV and FR Reductions in Elliptic Curve Cryptography., , , and . EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, page 190-205. Springer, (1999)Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption., and . EUROCRYPT, volume 330 of Lecture Notes in Computer Science, page 419-453. Springer, (1988)Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract)., , and . EUROCRYPT, volume 658 of Lecture Notes in Computer Science, page 477-481. Springer, (1992)