Results 11 to 20 of about 963,035 (329)

Code Based Cryptography and Steganography [PDF]

open access: greenConference on Algebraic Informatics, 2013
For a long time, coding theory was only concerned by message integrity (how to protect against errors a message sent via some noisely channel). Nowadays, coding theory plays an important role in the area of cryptography and steganography. The aim of this paper is to show how algebraic coding theory offers ways to define secure cryptographic primitives ...
P. Véron
semanticscholar   +4 more sources

A QR code-based user-friendly visual cryptography scheme

open access: yesScientific Reports, 2022
Benefiting from the development of the Internet and smart devices, it is now convenient to transmit images anywhere and anytime, which poses a new challenge for image security.
Lijing Ren, Denghui Zhang
doaj   +3 more sources

TYRCA: A RISC-V Tightly-Coupled Accelerator for Code-Based Cryptography

open access: greenDesign, Automation and Test in Europe
Post-quantum cryptography (PQC) has garnered significant attention across various communities, particularly with the National Institute of Standards and Technology (NIST) advancing to the fourth round of PQC standardization. One of the leading candidates
Alessandra Dolmeta   +6 more
semanticscholar   +3 more sources

A Survey on Code-Based Cryptography [PDF]

open access: green, 2022
The improvements on quantum technology are threatening our daily cybersecurity, as a capable quantum computer can break all currently employed asymmetric cryptosystems. In preparation for the quantum-era the National Institute of Standards and Technology (NIST) has initiated in 2016 a standardization process for public-key encryption (PKE) schemes, key-
Violetta Weger   +2 more
openalex   +3 more sources

Optimized implementation of QC‐MDPC code‐based cryptography

open access: greenConcurrency and Computation, 2018
This paper presents a new enhanced version of the QcBits key encapsulation mechanism, which is a constant‐time implementation of the Niederreiter cryptosystem using QC‐MDPC codes.
Antonio Guimarães   +2 more
semanticscholar   +3 more sources

Polynomial Structures in Code-Based Cryptography [PDF]

open access: greenInternational Conference on Cryptology in India, 2013
In this article we discus a probability problem applied in the code based cryptography. It is related to the shape of the polynomials with exactly t different roots. We will show that the structure is very dense and the probability that this type of polynomials has at least one coefficient equal to zero is extremelly low.
V. Dragoi   +3 more
semanticscholar   +4 more sources

Lossy Cryptography from Code-Based Assumptions [PDF]

open access: green
Over the past few decades, we have seen a proliferation of advanced cryptographic primitives with lossy or homomorphic properties built from various assumptions such as Quadratic Residuosity, Decisional Diffie-Hellman, and Learning with Errors. These primitives imply hard problems in the complexity class $SZK$ (statistical zero-knowledge); as a ...
Quang Dao, Aayush Jain
openalex   +3 more sources

Post-Quantum Cryptography: Code-based Signatures [PDF]

open access: green, 2013
This survey provides a comparative overview of code-based signature schemes with respect to security and performance. Furthermore, we explicitly describe serveral code-based signature schemes with additional properties such as identity-based, threshold ring and blind signatures.
Pierre-Louis Cayrel, Mohammed Meziani
openalex   +4 more sources

Code-Based Cryptography [PDF]

open access: bronze
CBCrypto 2024 Zürich   +3 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy