Cryptology ePrint Archive: Report 2010/465
Available versions in chronological order
20100908:180438 (posted 08-Sep-2010 18:04:38 UTC)
How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices
Falko Strenzke
20120420:173627 (posted 20-Apr-2012 17:36:27 UTC)
How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices
Falko Strenzke
[
Cryptology ePrint archive
]