In cryptography, the Niederreiter cryptosystem is a variation of the McEliece cryptosystem developed in 1986 by Harald Niederreiter. It applies the same...
5 KB (675 words) - 02:49, 7 July 2023
Russell, Alexander (2011). Rogaway, Philip (ed.). McEliece and Niederreiter cryptosystems that resist quantum Fourier sampling attacks. Advances in cryptology—CRYPTO...
16 KB (2,092 words) - 15:59, 4 June 2025
other areas of cryptography such as public key cryptography. The Niederreiter cryptosystem, an encryption system based on error-correcting codes that can...
7 KB (729 words) - 13:14, 14 October 2023
EPOC Kyber Merkle–Hellman knapsack cryptosystem – knapsack scheme McEliece cryptosystem Niederreiter cryptosystem NTRUEncrypt RSA – factoring RSA-KEM...
20 KB (1,901 words) - 07:15, 23 January 2025
codes are used in several post-quantum cryptosystems, notably McEliece cryptosystem and Niederreiter cryptosystem. Elwyn R. Berlekamp, Goppa Codes, IEEE...
6 KB (1,154 words) - 17:54, 18 January 2025
Hang; Moore, Cristopher; Russell, Alexander (2011), "McEliece and Niederreiter cryptosystems that resist quantum Fourier sampling attacks", Advances in Cryptology...
16 KB (1,459 words) - 08:33, 24 April 2025
cryptography • New Data Seal • NewDES • N-Hash • Nicolas Courtois • Niederreiter cryptosystem • Niels Ferguson • Nigel de Grey • Nihilist cipher • Nikita Borisov...
67 KB (2,932 words) - 23:20, 16 May 2025
instantiate the McEliece and Niederreiter cryptosystems and related schemes. His paper "Efficient Algorithms for Pairing-Based Cryptosystems", jointly written with...
9 KB (833 words) - 22:01, 29 November 2024
Hachenberger, Completely free elements, in Cohen & Niederreiter (1996) pp. 97–107 Zbl 0864.11066 Cohen, S.; Niederreiter, H., eds. (1996). Finite Fields and Applications...
16 KB (3,146 words) - 03:06, 28 January 2025
function is very similar to the encoding function of Niederreiter's version of McEliece cryptosystem. Instead of using the parity check matrix of a permuted...
19 KB (2,941 words) - 09:27, 9 June 2025
systems which rely on error-correcting codes, such as the McEliece and Niederreiter encryption algorithms and the related Courtois, Finiasz and Sendrier...
64 KB (6,569 words) - 09:25, 1 July 2025