References
- N. Aragon, P.S.L.M. Barreto, S. Bettaieb, L. Bidoux, O. Blazy, J.C. Deneuville, P. Gaborit, S. Gueron, T. Güneysu, C.A. Melchor, R. Misoczki, E. Persichetti, N. Sendrier, J.P. Tillich, V. Vasseur, and G. Zémor, BIKE: Bit Flipping key encapsulation (2017). Available at https://bikesuite.org/files/BIKE.2017.11.30.pdf.
- N. Aragon, P.S.L.M. Barreto, S. Bettaieb, L. Bidoux, O. Blazy, J.C. Deneuville, P. Gaborit, S. Gueron, T. Güneysu, C.A. Melchor, R. Misoczki, E. Persichetti, N. Sendrier, J.P. Tillich, V. Vasseur, and G. Zémor, BIKE: Bit flipping key encapsulation (2017). Available at https://bikesuite.org/files/round2/spec/BIKE-Spec-2019.06.30.1.pdf.
- M. Baldi, A. Barenghi, F. Chiaraluce, G. Pelosi, and P. Santini, LEDAcrypt: Low-dEnsity parity-check coDe-bAsed cryptographic systems (2020). Available at https://www.ledacrypt.org/.
- P.S. Barreto, S. Gueron, T. Gueneysu, R. Misoczki, E. Persichetti, N. Sendrier, and J.P. Tillich, CAKE: Code-based algorithm for key encapsulation, IMA International Conference on Cryptography and Coding, Springer, 2017, pp. 207–226.
- J.C. Deneuville, P. Gaborit, and G. Zémor, Ouroboros: A simple, secure and efficient key exchange protocol based on coding theory, International Workshop on Post-Quantum Cryptography, Springer, 2017, pp. 18–34.
- N. Drucker, S. Gueron, and D. Kostic, On constant-time QC-MDPC decoding with negligible failure rate, Cryptology ePrint Archive, Report 2019/1289 (2019), Available at https://eprint.iacr.org/2019/1289.
- N. Drucker, S. Gueron, and D. Kostic, QC-MDPC decoders with several shades of gray, Cryptology ePrint Archive, Report 2019/1423 (2020). Available at https://eprint.iacr.org/2019/1423.
- D. Hofheinz, K. Hövelmanns, and E. Kiltz, A modular analysis of the Fujisaki-Okamoto transformation, in Theory of Cryptography, Y. Kalai and L. Reyzin, eds., Springer International Publishing, Cham, 2017, pp. 341–371. doi:https://doi.org/10.1007/978-3-319-70500-2_12.
- V. Shoup, Using hash functions as a hedge against chosen ciphertext attack, in International Conference on the Theory and Applications of Cryptographic Techniques, Springer, 2000, pp. 275–288.