Cryptography Reference
In-Depth Information
10. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve
Cryptography and RSA on 8-Bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES
2004. LNCS, vol. 3156, pp. 119-132. Springer, Heidelberg (2004)
11. Heyse, S.: Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcon-
trollers. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol. 6061, pp. 165-181.
Springer, Heidelberg (2010)
12. Horner, W.G.: A new method of solving numerical equations of all orders, by con-
tinuous approximation. Philosophical Transactions of the Royal Society of Lon-
don 109, 308-335 (1981)
13. Kobara, K., Imai, H.: Semantically Secure McEliece Public-key Cryptosystems-
conversions for McEliece PKC. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992,
pp. 19-35. Springer, Heidelberg (2001)
14. MacWilliams, F.J., Sloane, N.: The Theory of Error-Correcting Codes. North-
Holland Mathematical Library, vol. 16 (1997)
15. McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN
Progress Report 42-44, Jet Propulsion Laboratory (January-February 1978)
16. Misoczki, R., Barreto, P.S.: Compact McEliece Keys from Goppa Codes. In: Ja-
cobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867,
pp. 376-392. Springer, Heidelberg (2009)
17. Morii, M., Kasahara, M.: Ecient construction of gate circuit for computing mul-
tiplicative inverses over gf (2 m ). Transactions of the IEICE E72, 37-42 (1989)
18. Paar, C.: Ecient VLSI Architectures for Bit-Parallel Computation in Galois
Fields. Dissertation, Institute for Experimental Mathematics, Universitat Essen
(1994)
19. Pointcheval, D.: Chosen-Ciphertext Security for Any One-Way Cryptosystem. In:
Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 129-146. Springer,
Heidelberg (2000)
20. Preneel, B., Bosselaers, A., Govaerts, R., Vandewalle, J.: A software implementa-
tion of the McEliece public-key cryptosystem. In: Proceedings of the 13th Sympo-
sium on Information Theory in the Benelux, Werkgemeenschap voor Informatieen
Communicatietheorie, pp. 119-126. Springer, Heidelberg (1992)
21. Prometheus. Implementation of McEliece cryptosystem for 32-bit microprocessors
(c-source), http://www.eccpage.com/
22. Sendrier, N.: Encoding information into constant weight words. In: IEEE Confer-
ence, ISIT 2005, pp. 435-438 ( September 2005)
23. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete loga-
rithms on a quantum computer. SIAM J. Comput. 26(5), 1484-1509 (1997)
 
 
Search WWH ::




Custom Search