E
Edoardo Persichetti
Researcher at Florida Atlantic University
Publications - 59
Citations - 904
Edoardo Persichetti is an academic researcher from Florida Atlantic University. The author has contributed to research in topics: Cryptography & Coding theory. The author has an hindex of 15, co-authored 50 publications receiving 564 citations. Previous affiliations of Edoardo Persichetti include Florida State University College of Arts and Sciences & Dakota State University.
Papers
More filters
Book ChapterDOI
Efficient implementation of a CCA2-Secure variant of mceliece using generalized srivastava codes
TL;DR: This paper provides secure parameters for a classical McEliece encryption scheme based on quasi-dyadic generalized Srivastava codes, and successively converts the scheme to a CCA2-secure protocol in the random oracle model applying the Fujisaki-Okamoto transform.
Book ChapterDOI
CAKE: Code-based Algorithm for Key Encapsulation
Paulo S. L. M. Barreto,Paulo S. L. M. Barreto,Shay Gueron,Shay Gueron,Tim Güneysu,Rafael Misoczki,Edoardo Persichetti,Nicolas Sendrier,Jean-Pierre Tillich +8 more
TL;DR: In this article, a key encapsulation algorithm based on the QC-MDPC McEliece encryption scheme, called CAKE, was proposed for post-quantum key exchange.
Dissertation
Improving the Efficiency of Code-Based Cryptography
TL;DR: This work is based on Generalized Srivastava codes and represents a generalization of the Quasi-Dyadic scheme proposed by Misoczki and Barreto, with two advantages: a better flexibility, and improved resistance to all the known attacks.
Book ChapterDOI
Secure and Anonymous Hybrid Encryption from Coding Theory
TL;DR: This work presents a hybrid construction based on the Niederreiter framework that provides IND- CCA security in the random oracle model that satisfies the IK-CCA notion of anonymity whose importance is ever growing in the cryptographic community.
Book ChapterDOI
LESS-FM: Fine-Tuning Signatures from the Code Equivalence Problem
TL;DR: In this article, the authors revisited a recent work using an innovative approach for signing, based on the hardness of the code equivalence problem, and introduced some optimizations and provided a security analysis for all variants considered.