Privacy Protection of Digital Images Using Watermarking and QR Code-based Visual Cryptography
The increase in information sharing in terms of digital images imposes threats to privacy and personal identity. Digital images can be stolen while in transfer and any kind of alteration can be done very easily. Thus, privacy protection of digital images
Akanksha Arora +2 more
doaj +1 more source
Modified pqsigRM: RM Code-Based Signature Scheme
We present a novel code-based signature scheme called modified pqsigRM. This scheme is based on a modified Reed-Muller (RM) code, which reduces the signing complexity and key size compared with existing code-based signature schemes.
Yongwoo Lee +3 more
doaj +1 more source
Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions
Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys ...
Bertrand Cambou +8 more
doaj +1 more source
Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals [PDF]
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography
M. Zeynali +2 more
doaj +1 more source
A Mathematical Perspective on Post-Quantum Cryptography
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography.
Maximilian Richter +3 more
doaj +1 more source
MATHEMATICAL MODELS OF HYBRID CRYPTO CODE CONSTRUCTIONS ON DAMAGED CODES
The subject are mathematical models of building hybrid (complex) cryptosystems based on Mac-Elis crypto-code constructions on damaged codes. The purpose of this work is cryptographic mechanisms design in post-quantum cryptography to provide basic ...
Serhii Yevseiev +2 more
doaj +1 more source
Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC).
ByeongGyu Park +4 more
doaj +1 more source
Code-Based Cryptography With Generalized Concatenated Codes for Restricted Error Values
Code-based cryptosystems are promising candidates for post-quantum cryptography. Recently, generalized concatenated codes over Gaussian and Eisenstein integers were proposed for those systems. For a channel model with errors of restricted weight, those q-
Johann-Philipp Thiers +1 more
doaj +1 more source
Post-quantum Cryptography: Code-Based Signatures [PDF]
This survey provides a comparative overview of code-based signature schemes with respect to security and performance. Furthermore, we explicitly describe serveral code-based signature schemes with additional properties such as identity-based, threshold ring and blind signatures.
Cayrel, Pierre-Louis, Meziani, Mohammed
openaire +2 more sources
Post-Quantum Two-Party Adaptor Signature Based on Coding Theory
An adaptor signature can be viewed as a signature concealed with a secret value and, by design, any two of the trio yield the other. In a multiparty setting, an initial adaptor signature allows each party to create additional adaptor signatures without ...
Jean Belo Klamti, M. Anwar Hasan
doaj +1 more source

