Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

post-quantum public-key algorithm

biblio

Visible to the public On the implementation of mceliece with CCA2 indeterminacy by SHA-3

Submitted by BrandonB on Wed, 05/06/2015 - 11:50am
  • McEliece algorithm
  • Vectors
  • SHA-3 module
  • SHA-3
  • secure hash algorithm
  • public-key
  • public key cryptography
  • post-quantum public-key algorithm
  • Post-quantum cryptography
  • Algorithm design and analysis
  • McEliece
  • Keccak
  • encryption
  • computer architecture
  • Clocks
  • CCA2 security standard
  • CCA2 indeterminacy
  • CCA2

Terms of Use  |  ©2023. CPS-VO