Cryptographic Migration & Agility
  • About Cryptographic Migration & Agility
  • Category Overview
  • Projects and Initiatives
  • Libraries and Interfaces
  • Home
  • English
    Chinese
English
Chinese
  • Cryptographic Migration & Agility
    • About Cryptographic Migration & Agility
    • Category Overview
    • PQC Migration Overview
    • Related Work
    • Scheme Development
      • NIST PQC Algorithms
        • BIKE
        • CRYSTALS-Dilithium
        • Falcon
        • FrodoKEM
        • GeMSS
        • HQC
        • CRYSTALS-Kyber
        • Classic McEliece
        • NTRU
        • Picnic
        • NTRU-Prime
        • Rainbow
        • SABER
        • SIKE
        • SPHINCS+
      • Code-Based Schemes
      • Hash-Based Schemes
      • Lattice-Based Schemes
      • Multivariate-Based Schemes
      • Isogeny-Based Schemes
      • Other Development Efforts
    • Security Analysis
      • Cryptanalysis
      • Side-Channel Attacks
    • Evaluations & Integrations
      • Hardware Evaluations
        • General
        • FPGA Evaluations
        • Embedded Evaluations
        • IoT Evaluations
        • Automotive Evaluations
        • Micro-Controller Evaluations
      • Security Protocols & Applications
        • MACsec
        • CHAP/PAP
        • IPsec/IKEv2
        • TLS/SSL
        • DTLS
        • SRTP/ZRTP
        • Signal Protocol
        • SSH
        • Virtual Private Network (VPN)
        • DNSSEC
        • S/MIME
        • PGP/GPG
        • Kerberos
        • Single Sign-On
        • SFTP
        • Public Key Infrastructure (PKI) & Certificate
        • Distributed Ledger (Blockchain)
        • Wireless Networks
        • Onion Routing & Tor Network
        • eIDs
        • Others
    • Migration
      • Approaches & Strategies
      • Testing & Automation
      • Standards & Drafts
    • Cryptographic Agility
      • Approaches & Strategies
    • Projects and Initiatives
    • Libraries and Interfaces
    • References
    • How to Contribute
    • Contributors
  1. Cryptographic Migration & Agility
  2. Scheme Development
  3. Code-Based Schemes

Code-Based Schemes

  • A Public-Key Cryptosystem Based On Algebraic Coding Theory: [M78]
  • A Survey on Code-Based Cryptography: [WGR22]
  • Code-based key encapsulation mechanisms for post-quantum standardization: [KLK18]
  • Implementing QC-MDPC McEliece Encryption: [MOG15]
  • LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action.: [BBP21]
  • Lightweight code-based cryptography: QC-MDPC McEliece encryption on reconfigurable devices: [vG14]
  • McBits Revisited: [C17]
  • McBits: Fast Constant-Time Code-Based Cryptography: [BCS13]
  • McEliece Cryptosystem Implementation: Theory and Practice: [BS08]
  • McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers: [BL20]
  • NIST PQC: CODE-BASED CRYPTOSYSTEMS: [KGP19]
  • QC-MDPC Decoders with Several Shades of Gray.: [DGK20]
  • Quasi-Cyclic Low-Density Parity-Check Codes in the McEliece Cryptosystem: [BCG07]
  • Reducing Key Length of the McEliece Cryptosystem: [BCG09]
  • Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices: [HvG13]
  • Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices: [vG14]
Last modified February 12, 2022

© 2022 Darmstadt University of Applied Sciences
Impress