Results 121 to 130 of about 3,550 (163)

Code-Based Cryptography

2021
This chapter focuses on the essentials of code-based cryptography and on coding theory and the associated hard problems useful for cryptography as well as more recent proposals for public-key cryptography, key-exchange protocols, and digital signatures. Code-based cryptography was originally proposed using the standard Hamming metric. The M.
Gaborit, Philippe   +1 more
openaire   +3 more sources

Cryptography With McEliece Algorithm (Code Based Cryptography)

Jurnal Teknik Indonesia, 2023
The McEliece algorithm is one of the code-based cryptography methods that offers a high level of security, especially against quantum computing threats. This algorithm uses error-correcting codes to encrypt messages, making them difficult to crack by conventional cryptanalysis attacks.
null Priska Gultom   +3 more
openaire   +1 more source

Critical attacks in code-based cryptography

International Journal of Information and Coding Theory, 2015
Summary: Code-based cryptographic schemes are promising candidates for post-quantum cryptography since they are fast, require only basic arithmetic, and have a well understood security. While there is strong evidence that cryptosystems like McEliece and Niederreiter are secure, they have certain weaknesses when used without semantic conversions ...
Cayrel, Pierre Louis   +3 more
openaire   +2 more sources

Cryptography With Mceliece Algorithm (Code Based Cryptography)

Jurnal Teknik Indonesia
Cryptography is the science used to protect information from unauthorized access. One promising cryptographic algorithm is the McEliece algorithm, which uses code-based cryptography. This algorithm was introduced by Robert McEliece in 1978 and is known for its resistance to attacks from quantum computers, which are expected to be able to break most ...
null Caleg Sadrak Sinaga   +4 more
openaire   +1 more source

New Code Based Fuzzy Extractor for Biometric Cryptography

2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), 2018
In this paper methods of forming cryptographic keys from biometric images using fuzzy extractors are considered. A new scheme of a fuzzy extractor based on the McEIiece cryptosystem is proposed. It is shown that the new design of the fuzzy extractor allows forming cryptographic passwords from biometric images even without the use of non-secret helper ...
Alexandr Kuznetsov   +4 more
openaire   +1 more source

Security in quantum cryptography

Reviews of Modern Physics, 2022
Christopher Portmann, Renato Renner
exaly  

Home - About - Disclaimer - Privacy