-
Alice computes the message, m, via mT = P−1PmT. Courtois,
Finiasz and
Sendrier showed how the
Niederreiter cryptosystem can be used to
derive a signature...
-
Niederreiter encryption algorithms and the
related Courtois,
Finiasz and
Sendrier Signature scheme. The
original McEliece signature using random Goppa codes...
-
functions introduced in 2003 by
Daniel Augot,
Matthieu Finiasz, and
Nicolas Sendrier.
Unlike most
other cryptographic hash
functions in use today, FSB can to...
- 1007/978-3-540-88403-3_3. ISBN 978-3-540-88402-6. Bernstein,
Daniel J. (2010).
Sendrier,
Nicolas (ed.).
Grover vs.
McEliece (PDF). Post-quantum
cryptography 2010...
-
method has been
improved in
various ways, e.g. by
Stern and
Canteaut and
Sendrier.
Partial response maximum likelihood (PRML) is a
method for converting...
- OCLC 665137861. Bernstein,
Daniel J. (2010). "Grover vs. McEliece" (PDF). In
Sendrier,
Nicolas (ed.). Post-Quantum Cryptography,
Third International Workshop...
- ISBN 978-3-642-05443-3. Misoczki, Rafael; Tillich, Jean-Pierre;
Sendrier, Nicolas; Barreto,
Paulo S. L. M. (2013). "MDPC-McEliece: New McEliece...