E
Edoardo Persichetti
Researcher at Florida Atlantic University
Publications - 59
Citations - 904
Edoardo Persichetti is an academic researcher from Florida Atlantic University. The author has contributed to research in topics: Cryptography & Coding theory. The author has an hindex of 15, co-authored 50 publications receiving 564 citations. Previous affiliations of Edoardo Persichetti include Florida State University College of Arts and Sciences & Dakota State University.
Papers
More filters
BIKE: Bit Flipping Key Encapsulation
Nicolas Aragon,Paulo S. L. M. Barreto,Slim Bettaieb,Loïc Bidoux,Olivier Blazy,Jean-Christophe Deneuville,Philippe Gaborit,Shay Gueron,Tim Güneysu,Carlos Aguilar Melchor,Rafael Misoczki,Edoardo Persichetti,Nicolas Sendrier,Jean-Pierre Tillich,Gilles Zémor +14 more
TL;DR: HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not, for teaching and research institutions in France or abroad, or from public or private research centers.
Hamming Quasi-Cyclic (HQC)
Carlos Aguilar Melchor,Nicolas Aragon,Slim Bettaieb,Loïc Bidoux,Olivier Blazy,Jean-Christophe Deneuville,Philippe Gaborit,Edoardo Persichetti,Gilles Zémor +8 more
Book ChapterDOI
Tighter proofs of CCA security in the quantum random oracle model
TL;DR: An improved reduction for the security of the Hofheinz, Hovelmanns, and Kiltz (TCC’17) transform is improved which turns OW-CPA secure deterministic PKEs into IND-CCA secure KEMs.
Posted Content
Compact McEliece keys based on Quasi-Dyadic Srivastava codes.
TL;DR: This paper introduces a construction based on Generalized Srivastava codes, a large class which includes Goppa codes as a special case, that allows relatively short public keys without being vulnerable to known structural attacks.
Journal ArticleDOI
Compact McEliece keys based on quasi-dyadic Srivastava codes
TL;DR: In this paper, a construction based on Generalized Srivastava codes, a large class which includes Goppa codes as a special case, that allows relatively short public keys without being vulnerable to known structural attacks is presented.