1 – 7 of 7
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2023
-
Mark
A side-channel attack on a masked and shuffled software implementation of Saber
(
- Contribution to journal › Article
- 2021
-
Mark
A side-channel attack on a masked IND-CCA secure saber KEM implementation
(
- Contribution to journal › Article
- 2016
-
Mark
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension
(
- Contribution to journal › Article
- 2014
-
Mark
Improved Algorithms for Finding Low-Weight Polynomial Multiples in GF(2)[x] and Some Cryptographic Applications
(
- Contribution to journal › Article
- 2013
-
Mark
A new algorithm for finding low-weight polynomial multiples and its application to TCHo
2013) International Workshop on Coding and Cryptography, WCC 2013(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2011
-
Mark
An improvement to Stern's algorithm
2011)(
- Book/Report › Report
- 1997
-
Mark
A digital signature scheme based on random error-correcting codes
1997) 6th IMA International Conference on Cryptography and Coding, 1997 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1355. p.161-167(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding