Jan. 17, 2022, 2:20 a.m. | Loïc Bidoux, Philippe Gaborit, Mukul Kulkarni, Victor Mateu

cs.CR updates on arXiv.org arxiv.org

In this paper, we study code-based signatures constructed from Proof of
Knowledge (PoK). This line of work can be traced back to Stern who introduces
the first efficient PoK for the syndrome decoding problem in 1993. Afterward,
different variations were proposed in order to reduce signature's size. In
practice, obtaining a smaller signature size relies on the interaction of two
main considerations: (i) the underlying protocol and its soundness error and
(ii) the type of optimizations which are compatible with …

code problem signatures syndrome

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Digital Trust Cyber Transformation Senior

@ KPMG India | Mumbai, Maharashtra, India

Security Consultant, Assessment Services - SOC 2 | Remote US

@ Coalfire | United States

Sr. Systems Security Engineer

@ Effectual | Washington, DC

Cyber Network Engineer

@ SonicWall | Woodbridge, Virginia, United States

Security Architect

@ Nokia | Belgium