PERSICHETTI, Edoardo
 Distribuzione geografica
Continente #
EU - Europa 60
AS - Asia 44
NA - Nord America 15
AF - Africa 8
OC - Oceania 3
Totale 130
Nazione #
SG - Singapore 36
IT - Italia 29
US - Stati Uniti d'America 15
FR - Francia 7
GB - Regno Unito 7
DE - Germania 6
FI - Finlandia 6
IN - India 6
DZ - Algeria 4
CM - Camerun 3
NZ - Nuova Zelanda 3
EE - Estonia 2
SA - Arabia Saudita 2
CH - Svizzera 1
MA - Marocco 1
NO - Norvegia 1
SE - Svezia 1
Totale 130
Città #
Singapore 20
Rome 10
Helsinki 6
Lambeth 4
Oran 4
Solignac 4
Auckland 3
Patna 3
Aldershot 2
Ancona 2
Ashburn 2
Boardman 2
Bochum 2
Chennai 2
Fort Worth 2
Jeddah 2
Osimo 2
Springfield 2
Tartu 2
Tolentino 2
Trento 2
Turin 2
Verona 2
Boca Raton 1
Dallas 1
Derby 1
Morrovalle 1
Munich 1
North Bergen 1
Nuremberg 1
Paris 1
Prineville 1
Pune 1
Trondheim 1
Winterthur 1
Totale 96
Nome #
On the hardness of the Lee syndrome decoding problem 38
On the Computational Hardness of the Code Equivalence Problem in Cryptography 8
On the CCA2 Security of McEliece in the Standard Model 8
Secure and Anonymous Hybrid Encryption from Coding Theory 7
Compact McEliece keys based on quasi-dyadic Srivastava codes 7
Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup 7
On lower bounds for information set decoding over Fq and on the effect of partial knowledge 7
Low-Lee-Density Parity-Check Codes 6
Advanced signature functionalities from the code equivalence problem 6
DAGS: Reloaded Revisiting Dyadic Key Encapsulation 5
DAGS: Key encapsulation using dyadic GS codes 5
Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes 5
Tighter Proofs of CCA Security in the Quantum Random Oracle Model 4
Using Non-Binary LDPC and MDPC Codes in the McEliece Cryptosystem 4
Less is More: Code-based Signatures without Syndromes 4
Designing Efficient Dyadic Operations for Cryptographic Applications 4
Efficient one-time signatures from quasi-cyclic codes: A full treatment 4
On the performance and security of multiplication in gf(2n) 4
Code-based key encapsulation from McEliece’s cryptosystem 4
Efficient implementation of hybrid encryption from coding theory 4
From Key Encapsulation to Authenticated Group Key Establishment - A Compiler for Post-Quantum Primitives 4
Security Analysis of a Cryptosystem Based on Subspace Subcodes 3
LESS-FM: Fine-Tuning Signatures from the Code Equivalence Problem 3
CAKE: Code-Based Algorithm for Key Encapsulation 3
Improvement of Binary and Non Binary Statistical Decoding Algorithm 3
A Reaction Attack against Cryptosystems based on LRPC Codes 3
Code-based public-key encryption resistant to key leakage 3
Cryptanalysis of a code-based full-time signature 3
On Linear Complexity of Finite Sequences: Coding Theory and Applications to Cryptography 3
Leakage-resilient cryptography over large finite fields: Theory and practice 3
Reproducible families of codes and cryptographic applications 3
On the applicability of the Fujisaki–Okamoto transformation to the BIKE KEM 3
Cryptanalysis of a Code-Based Signature Scheme Based on the Schnorr-Lyubashevsky Framework 2
Totale 180
Categoria #
all - tutte 1.795
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 1.795


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2022/202355 0 0 0 0 0 0 27 24 0 1 3 0
2023/202489 0 2 5 8 2 7 4 13 0 23 8 17
2024/202536 12 6 18 0 0 0 0 0 0 0 0 0
Totale 180