|
Conferences in DBLP
(pqcrypto) 2008 (conf/pqcrypto/2008)
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory. [Citation Graph (, )][DBLP]
Square-Vinegar Signature Scheme. [Citation Graph (, )][DBLP]
Attacking and Defending the McEliece Cryptosystem. [Citation Graph (, )][DBLP]
McEliece Cryptosystem Implementation: Theory and Practice. [Citation Graph (, )][DBLP]
Merkle Tree Traversal Revisited. [Citation Graph (, )][DBLP]
Explicit Hard Instances of the Shortest Vector Problem. [Citation Graph (, )][DBLP]
Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and lIC-Derivatives. [Citation Graph (, )][DBLP]
Digital Signatures Out of Second-Preimage Resistant Hash Functions. [Citation Graph (, )][DBLP]
Cryptanalysis of Rational Multivariate Public Key Cryptosystems. [Citation Graph (, )][DBLP]
Syndrome Based Collision Resistant Hashing. [Citation Graph (, )][DBLP]
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems. [Citation Graph (, )][DBLP]
On the Power of Quantum Encryption Keys. [Citation Graph (, )][DBLP]
Secure PRNGs from Specialized Polynomial Maps over Any . [Citation Graph (, )][DBLP]
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy. [Citation Graph (, )][DBLP]
Side Channels in the McEliece PKC. [Citation Graph (, )][DBLP]
|