{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:54:50Z","timestamp":1773377690932,"version":"3.50.1"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,26]]},"DOI":"10.1109\/isit50566.2022.9834642","type":"proceedings-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T15:34:22Z","timestamp":1659540862000},"page":"1459-1464","source":"Crossref","is-referenced-by-count":7,"title":["Quasi-Cyclic Stern Proof of Knowledge"],"prefix":"10.1109","author":[{"given":"Lo\u00efc","family":"Bidoux","sequence":"first","affiliation":[{"name":"Technology Innovation Institute,UAE"}]},{"given":"Philippe","family":"Gaborit","sequence":"additional","affiliation":[{"name":"University of Limoges,France"}]},{"given":"Mukul","family":"Kulkarni","sequence":"additional","affiliation":[{"name":"Technology Innovation Institute,UAE"}]},{"given":"Nicolas","family":"Sendrier","sequence":"additional","affiliation":[{"name":"Inria,Paris,France"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_10"},{"key":"ref38","article-title":"A new identification scheme based on syndrome decoding","author":"stern","year":"1993","journal-title":"Annual International Conference on Advances in Cryptology (CRYPTO)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243805"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65411-5_1"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_40"},{"key":"ref30","article-title":"From 5-pass MQ-based identification to MQ-based signatures","author":"h\u00fclsing","year":"2016","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25405-5_4"},{"key":"ref36","article-title":"Signatures et authentications pour les cryptosyst&#x00E8;mes bas&#x00E9;s sur les codes correcteurs en m&#x00E9;trique de Hamming et en m&#x00E9;trique rang","author":"schrek","year":"2013","journal-title":"Ph D thesis"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_33"},{"key":"ref34","article-title":"A public-key cryptosystem based on algebraic coding theory","volume":"4244","author":"mceliece","year":"1978","journal-title":"Coding Thv"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-81293-5_2","article-title":"LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action","author":"barenghi","year":"2021","journal-title":"Post-Quantum Cryptography (PQCrypto) - Third International Workshop"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_18"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1007\/978-3-642-29011-4_31","article-title":"Decoding random binary linear codes in 2n\/20: How 1 + 1 = 0 improves information set decoding","volume":"7237","author":"becker","year":"2012","journal-title":"EUROCRYPT 2012 LNCS"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849585"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9517937"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45727-3_7"},{"key":"ref15","article-title":"Code-based Signatures from New Proofs of Knowledge for the Syndrome Decoding Problem","author":"bidoux","year":"2022"},{"key":"ref16","article-title":"Quasi-Cyclic Stern Proof of Knowledge","author":"bidoux","year":"2021"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19574-7_12"},{"key":"ref18","article-title":"The Picnic Signature Algorithm","author":"chase","year":"2020","journal-title":"NIST Post-Quantum Cryptography Standardization Project (Round 3)"},{"key":"ref19","article-title":"A new identification algorithm","author":"chen","year":"1995","journal-title":"Cryptography Policy and Algorithms Conference"},{"key":"ref28","article-title":"Designing a Practical Code-based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup","author":"gueron","year":"2021","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref4","article-title":"Hamming Quasi-Cyclic (HQC)","author":"aguilar melchor","year":"2020","journal-title":"NIST Post-Quantum Cryptography Standardization Project (Round 3)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25405-5_3"},{"key":"ref3","article-title":"BIKE: Bit Flipping Key Encapsulation","author":"aguilar melchor","year":"2020","journal-title":"NIST Post-Quantum Cryptography Standardization Project (Round 3)"},{"key":"ref6","article-title":"Classic McEliece","author":"albrecht","year":"2020","journal-title":"NIST Post-Quantum Cryptography Standardization Project (Round 3)"},{"key":"ref29","article-title":"A non asymptotic analysis of information set decoding","author":"hamdaoui","year":"2013","journal-title":"Cryptology EPrint Archive Report 2013\/496"},{"key":"ref5","article-title":"Rank Quasi-Cyclic (RQC)","author":"aguilar melchor","year":"2020","journal-title":"NIST Post-Quantum Cryptography Standardization Project (Round 2)"},{"key":"ref8","article-title":"Fiat-Shamir Transformation of Multi-Round Interactive Proofs","author":"attema","year":"2021","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17659-4_25"},{"key":"ref2","article-title":"ROLLO - Rank-Ouroboros, LAKE & LOCKER","author":"aguilar melchor","year":"2020","journal-title":"NIST Post-Quantum Cryptography Standardization Project (Round 2)"},{"key":"ref9","article-title":"LEDAcrypt","author":"baldi","year":"2020","journal-title":"NIST Post-Quantum Cryptography Standardization Project (Round 2)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2011.6089577"},{"key":"ref20","article-title":"MQDSS specifications","author":"chen","year":"2020","journal-title":"NIST Post-Quantum Cryptography Standardization Project (Round 2)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-0009-7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_10"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s002000050053"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_21"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_3"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34578-5_2"},{"key":"ref26","article-title":"How to prove yourself: Practical solutions to identification and signature problems","author":"fiat","year":"1986","journal-title":"Advances in Cryptology (CRYPTO)"},{"key":"ref25","article-title":"Shared Permutation for Syndrome Decoding: New Zero-Knowledge Protocol and Code-Based Signature","author":"feneuil","year":"2021","journal-title":"Cryptology ePrint Archive Report"}],"event":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","location":"Espoo, Finland","start":{"date-parts":[[2022,6,26]]},"end":{"date-parts":[[2022,7,1]]}},"container-title":["2022 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9834325\/9834269\/09834642.pdf?arnumber=9834642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:34:53Z","timestamp":1773347693000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9834642\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,26]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/isit50566.2022.9834642","relation":{},"subject":[],"published":{"date-parts":[[2022,6,26]]}}}