Results 121 to 130 of about 3,550 (163)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2021
This chapter focuses on the essentials of code-based cryptography and on coding theory and the associated hard problems useful for cryptography as well as more recent proposals for public-key cryptography, key-exchange protocols, and digital signatures. Code-based cryptography was originally proposed using the standard Hamming metric. The M.
Gaborit, Philippe +1 more
openaire +3 more sources
This chapter focuses on the essentials of code-based cryptography and on coding theory and the associated hard problems useful for cryptography as well as more recent proposals for public-key cryptography, key-exchange protocols, and digital signatures. Code-based cryptography was originally proposed using the standard Hamming metric. The M.
Gaborit, Philippe +1 more
openaire +3 more sources
Cryptography With McEliece Algorithm (Code Based Cryptography)
Jurnal Teknik Indonesia, 2023The McEliece algorithm is one of the code-based cryptography methods that offers a high level of security, especially against quantum computing threats. This algorithm uses error-correcting codes to encrypt messages, making them difficult to crack by conventional cryptanalysis attacks.
null Priska Gultom +3 more
openaire +1 more source
Critical attacks in code-based cryptography
International Journal of Information and Coding Theory, 2015Summary: Code-based cryptographic schemes are promising candidates for post-quantum cryptography since they are fast, require only basic arithmetic, and have a well understood security. While there is strong evidence that cryptosystems like McEliece and Niederreiter are secure, they have certain weaknesses when used without semantic conversions ...
Cayrel, Pierre Louis +3 more
openaire +2 more sources
Cryptography With Mceliece Algorithm (Code Based Cryptography)
Jurnal Teknik IndonesiaCryptography is the science used to protect information from unauthorized access. One promising cryptographic algorithm is the McEliece algorithm, which uses code-based cryptography. This algorithm was introduced by Robert McEliece in 1978 and is known for its resistance to attacks from quantum computers, which are expected to be able to break most ...
null Caleg Sadrak Sinaga +4 more
openaire +1 more source
New Code Based Fuzzy Extractor for Biometric Cryptography
2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), 2018In this paper methods of forming cryptographic keys from biometric images using fuzzy extractors are considered. A new scheme of a fuzzy extractor based on the McEIiece cryptosystem is proposed. It is shown that the new design of the fuzzy extractor allows forming cryptographic passwords from biometric images even without the use of non-secret helper ...
Alexandr Kuznetsov +4 more
openaire +1 more source
Security in quantum cryptography
Reviews of Modern Physics, 2022Christopher Portmann, Renato Renner
exaly

