|
Conferences in DBLP
(pqcrypto) 2010 (conf/pqcrypto/2010)
Properties of the Discrete Differential with Cryptographic Applications. [Citation Graph (, )][DBLP]
Growth of the Ideal Generated by a Quadratic Boolean Function. [Citation Graph (, )][DBLP]
Mutant Zhuang-Zi Algorithm. [Citation Graph (, )][DBLP]
Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme. [Citation Graph (, )][DBLP]
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes. [Citation Graph (, )][DBLP]
Grover vs. McEliece. [Citation Graph (, )][DBLP]
Information-Set Decoding for Linear Codes over Fq. [Citation Graph (, )][DBLP]
A Timing Attack against the Secret Permutation in the McEliece PKC. [Citation Graph (, )][DBLP]
Practical Power Analysis Attacks on Software Implementations of McEliece. [Citation Graph (, )][DBLP]
Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials. [Citation Graph (, )][DBLP]
Designing a Rank Metric Based McEliece Cryptosystem. [Citation Graph (, )][DBLP]
Secure Variants of the Square Encryption Scheme. [Citation Graph (, )][DBLP]
Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers. [Citation Graph (, )][DBLP]
Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles. [Citation Graph (, )][DBLP]
Proposal of a Signature Scheme Based on STS Trapdoor. [Citation Graph (, )][DBLP]
Selecting Parameters for the Rainbow Signature Scheme. [Citation Graph (, )][DBLP]
|