Reducing Key Length of the McEliece Cryptosystem, Progress in Cryptology ? Africacrypt'2009, pp.77-97, 2009. ,
DOI : 10.1007/BFb0019850
URL : https://hal.archives-ouvertes.fr/hal-01081727
A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem, Selected Areas in Cryptography, pp.171-186, 2010. ,
DOI : 10.1007/s002000050053
The Keccak sponge function family ,
Lightweight Code-based Authentication and Signature, IEEE International Symposium on Information Theory ? ISIT'2007, pp.191-195, 2007. ,
From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security, IEEE Transactions on Information Theory, vol.54, issue.8, pp.3631-3646, 2008. ,
DOI : 10.1109/TIT.2008.926303
Compact McEliece Keys from Goppa Codes, 2009. ,
DOI : 10.1007/978-3-642-05445-7_24
URL : https://hal.archives-ouvertes.fr/hal-00870932
An Efficient Identification Scheme Based on Permuted Kernels, Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '89, pp.606-609, 1990. ,
DOI : 10.1007/0-387-34805-0_54
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, SIAM Journal on Computing, vol.26, issue.5, pp.1484-1509, 1995. ,
DOI : 10.1137/S0097539795293172
Designing Identification Schemes with Keys of Short Size, Advances in Cryptology ? Proceedings of CRYPTO '94, pp.164-173, 1994. ,
DOI : 10.1007/3-540-48658-5_18
A new identification scheme based on syndrome decoding, Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, pp.13-21, 1994. ,
DOI : 10.1007/3-540-48329-2_2
Improved identification schemes based on error-correcting codes, Applicable Algebra in Engineering, Communication and Computing, vol.9, issue.1, pp.57-69, 1996. ,
DOI : 10.1007/s002000050053