Results 51 to 60 of about 706 (71)

New lattice attacks on DSA schemes

open access: yesJournal of Mathematical Cryptology, 2016
We prove that a system of linear congruences of a particular form has at most a unique solution below a certain bound which can be computed efficiently.
Poulakis Dimitrios
doaj   +1 more source

Characterizing overstretched NTRU attacks

open access: yesJournal of Mathematical Cryptology, 2020
Overstretched NTRU is a variant of NTRU with a large modulus. Recent lattice subfield and subring attacks have broken suggested parameters for several schemes.
De Micheli Gabrielle   +2 more
doaj   +1 more source

Codes from Jacobian surfaces

open access: yes, 2015
This paper is concerned with some Algebraic Geometry codes on Jacobians of genus 2 curves. We derive a lower bound for the minimum distance of these codes from an upper "Weil type" bound for the number of rational points on irreducible (possibly singular
Haloui, Safia
core  

Construction of LDPC convolutional codes via difference triangle sets. [PDF]

open access: yesDes Codes Cryptogr, 2021
Alfarano GN, Lieb J, Rosenthal J.
europepmc   +1 more source

Moderate-density parity-check codes from projective bundles. [PDF]

open access: yesDes Codes Cryptogr, 2022
Bariffi J   +3 more
europepmc   +1 more source

Low-rank parity-check codes over Galois rings. [PDF]

open access: yesDes Codes Cryptogr, 2021
Renner J, Neri A, Puchinger S.
europepmc   +1 more source

Security analysis of ZKPoK based on MQ problem in the multi-instance setting

open access: yesJournal of Mathematical Cryptology
Bidoux and Gaborit introduced a new general technique to improve zero-knowledge (ZK) proof-of-knowledge (PoK) schemes for a large set of well-known post-quantum hard computational problems such as the syndrome decoding, the permuted kernel, the rank ...
Kahrobaei Delaram   +2 more
doaj   +1 more source

Inner product functional encryption based on the UOV scheme

open access: yesJournal of Mathematical Cryptology
We analyze the efficiency and security of the inner product functional encryption (IPFE) protocol introduced in 2021 by Debnath, Mesnager, Dey, and Kundu, specifically when instantiated with UOV.
La Scala Roberto, Meneghetti Alessio
doaj   +1 more source

On the Dimension of Algebraic-Geometric Trace Codes

open access: yesMathematics, 2016
We study trace codes induced from codes defined by an algebraic curve X. We determine conditions on X which admit a formula for the dimension of such a trace code.
Phong Le, Sunil Chetty
doaj   +1 more source

Home - About - Disclaimer - Privacy