A survey on code-based cryptography

V Weger, N Gassner, J Rosenthal - arXiv preprint arXiv:2201.07119, 2022 - arxiv.org
The improvements on quantum technology are threatening our daily cybersecurity, as a
capable quantum computer can break all currently employed asymmetric cryptosystems. In …

MODRED: A code-based non-interactive key exchange protocol

J Pei, FW Fu - Theoretical Computer Science, 2024 - Elsevier
How to construct a non-interactive key exchange (NIKE) protocol based on coding theory is
an opening problem. In this paper, we propose the first code-based NIKE protocol …

Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem

T Johansson, M Khairallah, V Nguyen - Cryptology ePrint Archive, 2025 - eprint.iacr.org
In this paper, we introduce an oracle version of the Restricted Syndrome Decoding Problem
(RSDP) and propose novel authentication protocols based on the hardness of this problem …

[PDF][PDF] Codes & Restricted Objects Signature Scheme

M Baldi, A Barenghi, S Bitzer, P Karl, F Manganiello… - maths.ox.ac.uk
Codes & Restricted Objects Signature Scheme Page 1 CROSS Codes & Restricted Objects
Signature Scheme Marco Baldi Alessandro Barenghi Sebastian Bitzer Patrick Karl Felice …