In this paper we show that it is possible to extend the framework of Persichetti’s Nierreiter-based KEM [11] and create a secure KEM based on the McEliece protocol. This provides greater flexibility in the application of coding theory as a basis for cryptographic purposes.
Code-based key encapsulation from McEliece’s cryptosystem / Persichetti, E.. - (2017), pp. 454-459. - LECTURE NOTES IN COMPUTER SCIENCE. [10.1007/978-3-319-72453-9_36].
Code-based key encapsulation from McEliece’s cryptosystem
Persichetti E.
2017
Abstract
In this paper we show that it is possible to extend the framework of Persichetti’s Nierreiter-based KEM [11] and create a secure KEM based on the McEliece protocol. This provides greater flexibility in the application of coding theory as a basis for cryptographic purposes.File allegati a questo prodotto
Non ci sono file associati a questo prodotto.
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.