↓ Skip to main content

Post-Quantum Cryptography

Overview of attention for book
Cover of 'Post-Quantum Cryptography'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Post-Quantum Cryptography
  3. Altmetric Badge
    Chapter 2 On the Efficiency of Provably Secure NTRU
  4. Altmetric Badge
    Chapter 3 A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics
  5. Altmetric Badge
    Chapter 4 Differential Properties of the HFE Cryptosystem
  6. Altmetric Badge
    Chapter 5 The Cubic Simple Matrix Encryption Scheme
  7. Altmetric Badge
    Chapter 6 RankSign: An Efficient Signature Algorithm Based on the Rank Metric
  8. Altmetric Badge
    Chapter 7 Cryptanalysis of the Multivariate Signature Scheme Proposed in PQCrypto 2013
  9. Altmetric Badge
    Chapter 8 Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware
  10. Altmetric Badge
    Chapter 9 Transcript Secure Signatures Based on Modular Lattices
  11. Altmetric Badge
    Chapter 10 Post-Quantum Cryptography
  12. Altmetric Badge
    Chapter 11 An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme
  13. Altmetric Badge
    Chapter 12 Lattice Cryptography for the Internet
  14. Altmetric Badge
    Chapter 13 Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes
  15. Altmetric Badge
    Chapter 14 ZHFE, a New Multivariate Public Key Encryption Scheme
  16. Altmetric Badge
    Chapter 15 A Note on Quantum Security for Post-Quantum Cryptography
  17. Altmetric Badge
    Chapter 16 Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices
Attention for Chapter 8: Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware
Altmetric Badge

Citations

dimensions_citation
13 Dimensions

Readers on

mendeley
15 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware
Chapter number 8
Book title
Post-Quantum Cryptography
Published by
Springer, Cham, October 2014
DOI 10.1007/978-3-319-11659-4_8
Book ISBNs
978-3-31-911658-7, 978-3-31-911659-4
Authors

Stefan Heyse, Ralf Zimmermann, Christof Paar, Heyse, Stefan, Zimmermann, Ralf, Paar, Christof

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 15 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 15 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 5 33%
Student > Master 3 20%
Researcher 2 13%
Lecturer 1 7%
Professor > Associate Professor 1 7%
Other 0 0%
Unknown 3 20%
Readers by discipline Count As %
Computer Science 8 53%
Engineering 2 13%
Physics and Astronomy 1 7%
Mathematics 1 7%
Unknown 3 20%