Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
25
views
6
references
Top references
cited by
15
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
699
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Post-Quantum Cryptography
Grover vs. McEliece
other
Author(s):
Daniel J. Bernstein
Publication date
(Print):
2010
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
6
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Algorithms for quantum computation: discrete logarithms and factoring
P.W. Shor
(2024)
0
comments
Cited
337
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A method for finding codewords of small weight
Jacques Stern
(1989)
0
comments
Cited
65
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Attacking and Defending the McEliece Cryptosystem
Daniel J. Bernstein
,
Tanja Lange
,
Christiane Peters
(2008)
0
comments
Cited
37
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2010
Pages
: 73-80
DOI:
10.1007/978-3-642-12929-2_6
SO-VID:
9e5bf081-c1ac-4727-ba5a-e20602dd1395
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 61
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
pp. 73
Grover vs. McEliece
pp. 81
Information-Set Decoding for Linear Codes over F q
pp. 182
Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
Similar content
699
On the Security of Some Compact Keys for McEliece Scheme
Authors:
Elise Barelli
A simple power analysis attack on a McEliece cryptoprocessor
Authors:
H. Gregor Molter
,
Marc Stöttinger
,
Abdulhadi Shoufan
…
Improving code rate of McEliece's public-key cryptosystem
Authors:
C.S. PARK
See all similar
Cited by
15
The Variational Quantum Eigensolver: A review of methods and best practices
Authors:
Jules Tilly
,
Hongxiang Chen
,
Shuxiang Cao
…
Wild McEliece
Authors:
Daniel J. Bernstein
,
Tanja Lange
,
Christiane Peters
CAKE: Code-Based Algorithm for Key Encapsulation
Authors:
Paulo S. L. M. Barreto
,
Shay Gueron
,
Tim Güneysu
…
See all cited by