Edoardo Persichetti
Orcid: 0000-0002-1895-377X
According to our database1,
Edoardo Persichetti
authored at least 51 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Progress in Cryptology - INDOCRYPT 2024, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Adv. Math. Commun., 2023
2022
J. Math. Cryptol., 2022
Int. J. Comput. Math. Comput. Syst. Theory, 2022
On Linear Complexity of Finite Sequences : Coding Theory and Applications to Cryptography.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup.
Cryptogr., 2022
2021
Int. J. Comput. Math. Comput. Syst. Theory, 2021
Cryptanalysis of a Code-Based Signature Scheme Based on the Schnorr-Lyubashevsky Framework.
IEEE Commun. Lett., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021
Proceedings of the Code-Based Cryptography - 9th International Workshop, 2021
2020
J. Math. Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
A New Path to Code-based Signatures via Identification Schemes with Restricted Errors.
CoRR, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
From Key Encapsulation to Authenticated Group Key Establishment - A Compiler for Post-Quantum Primitives †.
Entropy, 2019
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019
2018
Cryptogr., 2018
On the Performance and Security of Multiplication in <i>GF</i>(2<sup><i>N</i></sup>).
Cryptogr., 2018
Proceedings of the Provable Security, 2018
2017
On lower bounds for information set decoding over <sub>q</sub> and on the effect of partial knowledge.
Int. J. Inf. Coding Theory, 2017
Proceedings of the Mathematical Aspects of Computer and Information Sciences, 2017
Proceedings of the Codes, Cryptology and Information Security, 2017
2015
IACR Cryptol. ePrint Arch., 2015
2013
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
J. Math. Cryptol., 2012
IACR Cryptol. ePrint Arch., 2012
Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes.
Proceedings of the Public Key Cryptography - PKC 2012, 2012