Results 1 to 10 of about 963,035 (329)

Error Amplification in Code-based Cryptography

open access: greenTransactions on Cryptographic Hardware and Embedded Systems, 2018
Code-based cryptography is one of the main techniques enabling cryptographic primitives in a post-quantum scenario. In particular, the MDPC scheme is a basic scheme from which many other schemes have been derived. These schemes rely on iterative decoding
Alexander Nilsson   +2 more
doaj   +5 more sources

Code-based Cryptography: Lecture Notes [PDF]

open access: greenarXiv.org, 2023
These lecture notes have been written for courses given at \'Ecole normale sup\'erieure de Lyon and summer school 2022 in post-quantum cryptography that took place in the university of Budapest.
Thomas Debris-Alazard
semanticscholar   +7 more sources

Secure and Efficient Code-Based Cryptography for Multi-Party Computation and Digital Signatures [PDF]

open access: goldComputer Sciences & Mathematics Forum, 2023
Code-based cryptography is a promising candidate for post-quantum cryptography due to its strong security guarantees and efficient implementations. In this paper, we explore the use of code-based cryptography for multi-party computation and digital ...
Abdellatif Kichna, Abderrazak Farchane
doaj   +3 more sources

Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography

open access: greenTransactions on Cryptographic Hardware and Embedded Systems, 2019
Chou suggested a constant-time implementation for quasi-cyclic moderatedensity parity-check (QC-MDPC) code-based cryptography to mitigate timing attacks at CHES 2016.
Bo-Yeon Sim   +5 more
doaj   +4 more sources

Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography [PDF]

open access: goldCryptography, 2021
The code-based McEliece and Niederreiter cryptosystems are promising candidates for post-quantum public-key encryption. Recently, q-ary concatenated codes over Gaussian integers were proposed for the McEliece cryptosystem, together with the one-Mannheim ...
Johann-Philipp Thiers   +1 more
doaj   +3 more sources

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

open access: yesCryptography, 2021
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on ...
Chithralekha Balamurugan   +3 more
doaj   +2 more sources

Privacy Protection of Digital Images Using Watermarking and QR Code-based Visual Cryptography [PDF]

open access: goldAdvances in Multimedia, 2023
The increase in information sharing in terms of digital images imposes threats to privacy and personal identity. Digital images can be stolen while in transfer and any kind of alteration can be done very easily. Thus, privacy protection of digital images
Akanksha Arora   +2 more
doaj   +2 more sources

Code-Based Cryptography With Generalized Concatenated Codes for Restricted Error Values

open access: yesIEEE Open Journal of the Communications Society, 2022
Code-based cryptosystems are promising candidates for post-quantum cryptography. Recently, generalized concatenated codes over Gaussian and Eisenstein integers were proposed for those systems. For a channel model with errors of restricted weight, those q-
Johann-Philipp Thiers   +1 more
doaj   +2 more sources

A Biological-Inspired Cryptosystem based on DNA Cryptography and Morse Code Ciphering Technique

open access: diamondASM Science Journal, 2022
Due to its prominent facility to hide colossal datasets with a high calibre of randomness and subsequent protection, the famous genomic Deoxyribonucleic Acid (DNA) has been presented as a hiding medium, known as DNA steganography.
Adithya B   +1 more
doaj   +3 more sources

Error-correcting pairs: a new approach to code-based cryptography [PDF]

open access: yesACCA, 2014
International audienceMcEliece proposed the first public-key cryptosystem based on linear error-correcting codes. A code with an efficient bounded distance decoding algorithm is chosen as secret key. It is assumed that the chosen code looks like a random
Irene Marquez Corbella, R. Pellikaan
semanticscholar   +4 more sources

Home - About - Disclaimer - Privacy