Postquantum key exchange -a new hope, Cryptology ePrint Archive, 1092. ,
A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes, Proceedings of the 6th international conference on Security and Cryptography for Networks, pp.246-262, 2008. ,
DOI : 10.1007/978-3-540-85855-3_17
Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC Codes, 2007 IEEE International Symposium on Information Theory, pp.2591-2595, 2007. ,
DOI : 10.1109/ISIT.2007.4557609
On the Usage of Quasi-Cyclic Low-Density Parity-Check Codes in the McEliece Cryptosystem, 2006 First International Conference on Communications and Electronics, pp.305-310, 2006. ,
DOI : 10.1109/CCE.2006.350824
Quasi-cyclic low-density parity-check codes in the McEliece cryptosystem, IEEE International Conference on Communications, pp.951-956, 2007. ,
Decoding Random Binary Linear Codes in 2 n/20: How 1???+???1???=???0 Improves Information Set Decoding, Advances in Cryptology - EUROCRYPT 2012, pp.520-536, 2012. ,
DOI : 10.1007/978-3-642-29011-4_31
On the inherent intractability of certain coding problems (corresp.) Information Theory, IEEE Transactions on, vol.24, issue.3, pp.384-386, 1978. ,
Grover vs. McEliece, pp.73-80, 2010. ,
McBits: Fast Constant-Time Code-Based Cryptography, In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics LNCS of Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol.8086, issue.12, pp.250-272 ,
DOI : 10.1007/978-3-642-40349-1_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.308.6027
Frodo, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, 2016. ,
DOI : 10.1007/978-3-662-46803-6_24
Post-quantum key exchange for the tls protocol from the ring learning with errors problem, Security and Privacy (SP), 2015 IEEE Symposium on, pp.553-570, 2015. ,
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, International Conference on the Theory and Applications of Cryptographic Techniques, pp.453-474, 2001. ,
DOI : 10.1007/3-540-44987-6_28
Security analysis of ike's signature-based keyexchange protocol, Annual International Cryptology Conference, pp.143-161, 2002. ,
Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes, Proceedings of PKC 2012, pp.138-155, 2012. ,
DOI : 10.1007/978-3-642-30057-8_9
URL : https://hal.archives-ouvertes.fr/ujm-00712875
Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes, Proceedings of PKC 2012, pp.138-155, 2012. ,
DOI : 10.1007/978-3-642-30057-8_9
URL : https://hal.archives-ouvertes.fr/ujm-00712875
Worst case QC-MDPC decoder for McEliece cryptosystem, 2016 IEEE International Symposium on Information Theory (ISIT), pp.1366-1370, 2016. ,
DOI : 10.1109/ISIT.2016.7541522
URL : https://hal.archives-ouvertes.fr/hal-01408633
Efficient Algorithms for Supersingular Isogeny Diffie-Hellman, pp.572-601, 2016. ,
DOI : 10.1049/el:19991230
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack, SIAM Journal on Computing, vol.33, issue.1, pp.167-226, 2004. ,
DOI : 10.1137/S0097539702403773
A distinguisher for high-rate McEliece cryptosystems, IEEE Transactions on Information Theory, issue.10, pp.596830-6844, 2013. ,
DOI : 10.1109/tit.2013.2272036
URL : https://hal.archives-ouvertes.fr/hal-01108602
Cryptanalysis of ring-lwe based key exchange with key share reuse, Cryptology ePrint Archive, 2016. ,
Shorter keys for code based cryptography, International Workshop on Coding and Cryptography (WCC 2005), pp.81-91, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-00078726
Low-density parity-check codes, IEEE Transactions on Information Theory, vol.8, issue.1, 1963. ,
DOI : 10.1109/TIT.1962.1057683
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors, pp.789-815, 2016. ,
DOI : 10.1109/SFCS.1994.365700
A non asymptotic analysis of information set decoding. Cryptology ePrint Archive, 2013. ,
Rfc 2409: The internet key exchange (ike) Status: Proposed Standard, 1998. ,
DOI : 10.17487/rfc2409
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices, International Workshop on Cryptographic Hardware and Embedded Systems, pp.273-292, 2013. ,
DOI : 10.1007/978-3-642-40349-1_16
Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies, International Workshop on Post-Quantum Cryptography, pp.19-34, 2011. ,
DOI : 10.1007/11533719_44
URL : https://hal.archives-ouvertes.fr/hal-00652846
Quantum Information Set Decoding Algorithms, PQCrypto 2017, pp.69-89, 2017. ,
DOI : 10.1109/FOCS.2004.53
URL : https://hal.archives-ouvertes.fr/hal-01661905
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol, pp.357-388, 2017. ,
DOI : 10.1007/3-540-48405-1_10
SIGMA: The ???SIGn-and-MAc??? Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols, Annual International Cryptology Conference, pp.400-425, 2003. ,
DOI : 10.1007/978-3-540-45146-4_24
Initial recommendations of long-term secure post-quantum systems, PQCRYPTO. EU. Horizon, 2015. ,
On Ideal Lattices and Learning with Errors over Rings, pp.1-23, 2010. ,
DOI : 10.1007/978-3-642-13190-5_1
URL : https://hal.archives-ouvertes.fr/hal-00921792
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension. Designs, Codes and Cryptography, pp.359-377, 2016. ,
Implementing qc-mdpc mceliece encryption, ACM Trans. Embed. Comput. Syst, vol.1444, issue.3, pp.1-4427, 2015. ,
On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes, Advances in Cryptology ? EUROCRYPT 2015, Part I, pp.203-228, 2015. ,
DOI : 10.1007/978-3-662-46800-5_9
A public-key cryptosystem based on algebraic coding theory, Deep Space Network Progress Report, vol.44, pp.114-116, 1978. ,
Improving lattice based cryptosystems using the hermite normal form. Cryptography and lattices, pp.126-145, 2001. ,
Use of Elliptic Curves in Cryptography, Advances in cryptology (CRYPTO 85), pp.417-426, 1986. ,
DOI : 10.1007/3-540-39799-X_31
Compact McEliece Keys from Goppa Codes, Selected Areas in Cryptography, pp.376-392, 2009. ,
DOI : 10.1007/978-3-642-05445-7_24
URL : https://hal.archives-ouvertes.fr/hal-00870932
MDPC-McEliece: New McEliece variants from Moderate Density Parity-Check codes, 2013 IEEE International Symposium on Information Theory, pp.2069-2073, 2013. ,
DOI : 10.1109/ISIT.2013.6620590
URL : https://hal.archives-ouvertes.fr/hal-00870929
Using low density parity check codes in the McEliece cryptosystem, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060), p.215, 2000. ,
DOI : 10.1109/ISIT.2000.866513
Lattice Cryptography for the Internet, International Workshop on Post-Quantum Cryptography, pp.197-219, 2014. ,
DOI : 10.1007/978-3-319-11659-4_12
A Decade of Lattice Cryptography, Foundations and Trends?? in Theoretical Computer Science, vol.10, issue.4, pp.283-424, 2016. ,
DOI : 10.1561/0400000074
Compact McEliece keys based on quasi-dyadic Srivastava codes, Journal of Mathematical Cryptology, vol.6, issue.2, pp.149-169, 2012. ,
DOI : 10.1515/jmc-2011-0099
URL : https://eprint.iacr.org/2011/179.pdf
Secure and anonymous hybrid encryption from coding theory Post-Quantum Cryptography: 5th International Workshop, Proceedings, pp.174-187, 2013. ,
DOI : 10.1007/978-3-642-38616-9_12
The use of information sets in decoding cyclic codes, IEEE Transactions on Information Theory, vol.8, issue.5, pp.5-9, 1962. ,
DOI : 10.1109/TIT.1962.1057777
On lattices, learning with errors, random linear codes, and cryptography, Journal of the ACM (JACM), vol.56, issue.6, p.34, 2009. ,
DOI : 10.1145/1060590.1060603
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
Decoding One Out of Many, LNCS, vol.8, issue.1, pp.51-67, 2011. ,
DOI : 10.1007/3-540-45708-9_19
Security architecture for the internet protocol. Status: Proposed Standard, 2005. ,
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, SIAM Journal on Computing, vol.26, issue.5, pp.1484-1509, 1997. ,
DOI : 10.1137/S0097539795293172
Analysis of information set decoding for a sub-linear error weight, LNCS, vol.9606, pp.144-161, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01244886
Lightweight code-based cryptography: QC- MDPC McEliece encryption on reconfigurable devices, Proceedings of the conference on Design European Design and Automation Association, p.38, 2014. ,
Towards side-channel resistant implementations of QC-MDPC McEliece encryption on constrained devices, pp.266-282, 2014. ,