%0 Conference Proceedings %T Code-Based Identification and Signature Schemes in Software %+ Center for Advanced Security Research Darmstadt [Darmstadt] (CASED) %+ Laboratoire Hubert Curien (LHC) %+ Technische Universitat Darmstadt Fachbereich Informatik %A Mohamed El Yousfi Alaoui, Sidi %A Cayrel, Pierre-Louis %A El Bansarkhani, Rachid %A Hoffmann, Gerhard %Z Part 2: Security Engineering %< avec comité de lecture %( Lecture Notes in Computer Science %B 1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES) %C Regensburg, Germany %Y Alfredo Cuzzocrea %Y Christian Kittl %Y Dimitris E. Simos %Y Edgar Weippl %Y Lida Xu %I Springer %3 Security Engineering and Intelligence Informatics %V LNCS %N 8128 %P 122-136 %8 2013-09-02 %D 2013 %K Cryptography %K zero-knowledge identification %K signatures %K coding theory %K efficient implementation %Z Computer Science [cs]/Cryptography and Security [cs.CR]Conference papers %X In this paper we present efficient implementations of several code-based identification schemes, namely the Stern scheme, the Véron scheme and the Cayrel-Véron-El Yousfi scheme. We also explain how to derive and implement signature schemes from the previous identification schemes using the Fiat-Shamir transformation. For a security of 80 bits and a document to be signed of size 1 kByte, we reach a signature in about 4 ms on a standard CPU. %G English %Z TC 5 %Z TC 8 %Z WG 8-4 %Z WG 8-9 %2 https://hal.science/hal-00864936/document %2 https://hal.science/hal-00864936/file/2013_-_Code-based_identification_and_signature_schemes_in_software.pdf %L hal-00864936 %U https://hal.science/hal-00864936 %~ UNIV-ST-ETIENNE %~ IOGS %~ CNRS %~ LAHC %~ PARISTECH %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC5 %~ IFIP-WG %~ IFIP-TC8 %~ IFIP-WG8-4 %~ IFIP-WG8-9 %~ IFIP-LNCS-8128 %~ UDL