Results 51 to 60 of about 706 (71)
Detecting Encrypted and Unencrypted Network Data Using Entropy Analysis and Confidence Intervals. [PDF]
Ticleanu OA +3 more
europepmc +1 more source
New lattice attacks on DSA schemes
We prove that a system of linear congruences of a particular form has at most a unique solution below a certain bound which can be computed efficiently.
Poulakis Dimitrios
doaj +1 more source
Characterizing overstretched NTRU attacks
Overstretched NTRU is a variant of NTRU with a large modulus. Recent lattice subfield and subring attacks have broken suggested parameters for several schemes.
De Micheli Gabrielle +2 more
doaj +1 more source
This paper is concerned with some Algebraic Geometry codes on Jacobians of genus 2 curves. We derive a lower bound for the minimum distance of these codes from an upper "Weil type" bound for the number of rational points on irreducible (possibly singular
Haloui, Safia
core
Construction of LDPC convolutional codes via difference triangle sets. [PDF]
Alfarano GN, Lieb J, Rosenthal J.
europepmc +1 more source
Moderate-density parity-check codes from projective bundles. [PDF]
Bariffi J +3 more
europepmc +1 more source
Low-rank parity-check codes over Galois rings. [PDF]
Renner J, Neri A, Puchinger S.
europepmc +1 more source
Security analysis of ZKPoK based on MQ problem in the multi-instance setting
Bidoux and Gaborit introduced a new general technique to improve zero-knowledge (ZK) proof-of-knowledge (PoK) schemes for a large set of well-known post-quantum hard computational problems such as the syndrome decoding, the permuted kernel, the rank ...
Kahrobaei Delaram +2 more
doaj +1 more source
Inner product functional encryption based on the UOV scheme
We analyze the efficiency and security of the inner product functional encryption (IPFE) protocol introduced in 2021 by Debnath, Mesnager, Dey, and Kundu, specifically when instantiated with UOV.
La Scala Roberto, Meneghetti Alessio
doaj +1 more source
On the Dimension of Algebraic-Geometric Trace Codes
We study trace codes induced from codes defined by an algebraic curve X. We determine conditions on X which admit a formula for the dimension of such a trace code.
Phong Le, Sunil Chetty
doaj +1 more source

