Publisher
Springer International Publishing
Reference11 articles.
1. Backes, M., Pfitzmann, B., Waidner, M.: A composable cryptographic library with nested operations. In 10th ACM Conference on Computer and Communications Security (CCS). Extended version at the eprint archive (2003). https://eprint.iacr.org/2003/015/
2. Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. Cryptology ePrint Archive: Report 2000/067. (Accessed 22 Dec 2000–13 Dec 2005)
3. Courtois, N., Finiasz, M., Sendrier, N.: How to achieve a McEliece-based digital signature scheme. Cryptology ePrint Archive, Report 2001/010 (2001). https://doi.org/10.1007/3-540-45682-1_10, https://eprint.iacr.org/2001/010
4. Lecture Notes in Computer Science;L Dallot,2008
5. Dottling, N., Dowsley, R., Muller-Quade, J., Nascimento, A.: A CCA2 secure variant of the McEliece cryptosystem. CoRR 1205.5224 (2012)