Cryptology ePrint Archive: Report 2010/465

Available versions in chronological order


How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices
Falko Strenzke

How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices
Falko Strenzke


[ Cryptology ePrint archive ]