Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
47
views
23
references
Top references
cited by
11
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,056
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Post-Quantum Cryptography
Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes
other
Author(s):
Magali Bardet
,
Julia Chaulet
,
Vlad Dragoi
,
Ayoub Otmani
,
Jean-Pierre Tillich
Publication date
(Online):
February 04 2016
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Value-based Healthcare
Most cited references
23
Record
: found
Abstract
: not found
Article
: not found
Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels
Erdal Arikan
(2009)
0
comments
Cited
113
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Polar Codes are Optimal for Lossy Source Coding
Satish Korada
,
Rüdiger Urbanke
(2010)
0
comments
Cited
66
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A method for finding codewords of small weight
Jacques Stern
(1989)
0
comments
Cited
65
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2016
Publication date (Online):
February 04 2016
Pages
: 118-143
DOI:
10.1007/978-3-319-29360-8_9
SO-VID:
09e8529d-924e-4c5a-964f-145c79db635e
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 233
Additively Homomorphic Ring-LWE Masking
pp. 29
Applying Grover’s Algorithm to AES: Quantum Resource Estimates
pp. 118
Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes
pp. 144
Analysis of Information Set Decoding for a Sub-linear Error Weight
pp. 245
A Homomorphic LWE Based E-voting Scheme
Similar content
3,056
Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem
Authors:
Cong Chen
,
Thomas Eisenbarth
,
Ingo von Maurich
…
Real-time implementation of a chaos based cryptosystem on low-cost hardware
Authors:
L. Merah
,
Lahcene Merah
,
Asma Adnane
…
Improving code rate of McEliece's public-key cryptosystem
Authors:
C.S. PARK
See all similar
Cited by
11
Evolution of the McEliece Public Key Encryption Scheme
Authors:
Dominic Bucerzan
,
Vlad Dragoi
,
Hervé Talé Kalachi
On Posets for Reliability: How Fine Can They Be?
Authors:
Valeriu Beiu
,
Simon Cowell
,
Vlad-Florin Dragoi
Fast Reliability Ranking of Matchstick Minimal Networks
Authors:
Vlad-Florin Dragoi
,
Valeriu Beiu
See all cited by