default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Likely matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 142 matches
- 2024
- Victor Dyseryn-Fostier:
Exploring the multi-dimensional approach in code-based cryptography. (Exploration de l'approche multi-dimensionnelle en cryptographie fondée sur les codes correcteurs d'erreurs). University of Limoges, France, 2024 - Franck Rivel Kamwa Djomou, Emmanuel Fouotsa, Tadmon Calvin:
Expanded low-rank parity-check codes and their application to cryptography. Cryptologia 48(4): 323-351 (2024) - Editorial Note: Coding and Cryptography 2022. Des. Codes Cryptogr. 92(3): 505 (2024)
- San Ling, Khoa Nguyen, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, Yanhong Xu:
Fully Dynamic Attribute-Based Signatures for Circuits from Codes. Public Key Cryptography (1) 2024: 37-73 - Oded Regev:
On Lattices, Learning with Errors, Random Linear Codes, and Cryptography. CoRR abs/2401.03703 (2024) - 2023
- Maxime Bombar:
Codes Structurés pour la Cryptographie: des Fondations Théoriques de la Sécurité aux Applications. (Structured Codes for Cryptography: from Source of Hardness to Applications). École Polytechnique, Palaiseau, France, 2023 - Mathieu Lhotel:
Using structured algebraic geometry codes in modern cryptography. (Utilisation de codes de géométrie algébrique structurés en cryptographie moderne). University of Burgundy - Franche-Comté, 2023 - Shuichi Katsumata, Toi Tomita, Shota Yamada:
Direct computation of branching programs and its applications to more efficient lattice-based cryptography. Des. Codes Cryptogr. 91(2): 391-431 (2023) - Yao-Ming Kuo, Francisco Garcia-Herrero, Oscar Ruano, Juan Antonio Maestro:
RISC-V Galois Field ISA Extension for Non-Binary Error-Correction Codes and Classical and Post-Quantum Cryptography. IEEE Trans. Computers 72(3): 682-692 (2023) - Alvaro Cintas Canto, Mehran Mozaffari Kermani, Reza Azarderakhsh:
Reliable Architectures for Finite Field Multipliers Using Cyclic Codes on FPGA Utilized in Classic and Post-Quantum Cryptography. IEEE Trans. Very Large Scale Integr. Syst. 31(1): 157-161 (2023) - Vasyl Ustimenko:
Linear Codes of Schubert Type and Quadratic Public Keys of Multivariate Cryptography (short paper). CQPC 2023: 50-56 - Carolin Hannusch, Giuseppe Filippone:
Decoding algorithm for HL-codes and performance of the DHH-cryptosystem - a candidate for post-quantum cryptography. CoRR abs/2303.09820 (2023) - Vasyl Ustimenko:
Linear codes of Schubert type and quadratic public keys of Multivariate Cryptography. IACR Cryptol. ePrint Arch. 2023: 175 (2023) - 2022
- Olivier Ruatta:
Polynômes : du discret (codes correcteurs et cryptographie basée sur les codes) et du continu (autour des trajectoires optimales). (Polynomials : driscrete (error correcting codes and code based cryptography) and continuous (around optimal trajectorties)). University of Limoges, France, 2022 - Maxime Bros:
Algebraic cryptanalysis and contributions to post-quantum cryptography based on error-correcting codes in the rank-metric. (Cryptanalyse algébrique et contributions à la cryptographie post-quantique basée sur les codes correcteurs d'erreurs en métrique rang). University of Limoges, France, 2022 - Tianyou Bao, José Luis Imaña, Pengzhou He, Jiafeng Xie:
Work-in-Progress: High-Performance Systolic Hardware Accelerator for RBLWE-based Post-Quantum Cryptography. CODES+ISSS 2022: 5-6 - Andrea Guerrieri, Gabriel Da Silva Marques, Francesco Regazzoni, Andres Upegui:
Optimizing Lattice-based Post-Quantum Cryptography Codes for High-Level Synthesis. DSD 2022: 777-784 - Ziwei Chen, Deyuan Chen, Can Zhang, Shaoshuai Gao:
Public-Key Turbo-Polar Codes as a Candidate for Post-Quantum Cryptography. ICCT 2022: 927-932 - Pierre Karpman, Charlotte Lefevre:
Time-Memory Tradeoffs for Large-Weight Syndrome Decoding in Ternary Codes. Public Key Cryptography (1) 2022: 82-111 - 2021
- Yann Connan:
Contribution à la cryptographie post-quantique basée sur les codes correcteurs d'erreurs en métrique rang : Hash Proof Systems et cryptographie à bas coût. (Contribution to post-quantum code-based cryptography in rank metric : Hash Proof Systems and lightweight cryptography). University of Limoges, France, 2021 - Valentin Vasseur:
Post-quantum cryptography: a study of the decoding of QC-MDPC codes. (Cryptographie post-quantique : étude du décodage des codes QC-MDPC). University of Paris, France, 2021 - Johann-Philipp Thiers, Jürgen Freudenberger:
Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography. Cryptogr. 5(4): 33 (2021) - Ruyi Wang, Yong Wang, Hao Xie:
New McEliece Cryptosystem Based on Polar-LDPC Concatenated Codes as a Post-quantum Cryptography. ICCT 2021: 111-116 - Vlad-Florin Dragoi, Andreea Szocs:
Structural Properties of Self-dual Monomial Codes with Application to Code-Based Cryptography. IMACC 2021: 16-41 - Vidhi Rana, Rémi A. Chou:
Design of Short Blocklength Wiretap Channel Codes: Deep Learning and Cryptography Working Hand in Hand. ITW 2021: 1-6 - Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi:
Updatable Signatures and Message Authentication Codes. Public Key Cryptography (1) 2021: 691-723 - Hermann Tchatchiem Kamche, Hervé Talé Kalachi, Franck Rivel Kamwa Djomou, Emmanuel Fouotsa:
Low-Rank Parity-Check Codes Over Finite Commutative Rings and Application to Cryptography. CoRR abs/2106.08712 (2021) - Wenshuo Guo, Fangwei Fu:
Expanded Gabidulin Codes and Their Application to Cryptography. CoRR abs/2107.01610 (2021) - Wenshuo Guo, Fangwei Fu:
Expanded Gabidulin Codes and Their Application to Cryptography. IACR Cryptol. ePrint Arch. 2021: 906 (2021) - 2020
- Nicolas Aragon:
Cryptographie à base de codes correcteurs d'erreurs en métrique rang et application. (Cryptography based on rank metric error correcting codes and applications). University of Limoges, France, 2020
skipping 112 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-12 07:14 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint