Results 11 to 20 of about 3,550 (163)

Privacy Protection of Digital Images Using Watermarking and QR Code-based Visual Cryptography

open access: yesAdvances in Multimedia, 2023
The increase in information sharing in terms of digital images imposes threats to privacy and personal identity. Digital images can be stolen while in transfer and any kind of alteration can be done very easily. Thus, privacy protection of digital images
Akanksha Arora   +2 more
doaj   +1 more source

Modified pqsigRM: RM Code-Based Signature Scheme

open access: yesIEEE Access, 2020
We present a novel code-based signature scheme called modified pqsigRM. This scheme is based on a modified Reed-Muller (RM) code, which reduces the signing complexity and key size compared with existing code-based signature schemes.
Yongwoo Lee   +3 more
doaj   +1 more source

Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions

open access: yesApplied Sciences, 2021
Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys ...
Bertrand Cambou   +8 more
doaj   +1 more source

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals [PDF]

open access: yesJournal of Artificial Intelligence and Data Mining, 2020
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography
M. Zeynali   +2 more
doaj   +1 more source

A Mathematical Perspective on Post-Quantum Cryptography

open access: yesMathematics, 2022
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography.
Maximilian Richter   +3 more
doaj   +1 more source

MATHEMATICAL MODELS OF HYBRID CRYPTO CODE CONSTRUCTIONS ON DAMAGED CODES

open access: yesСучасні інформаційні системи, 2019
The subject are mathematical models of building hybrid (complex) cryptosystems based on Mac-Elis crypto-code constructions on damaged codes. The purpose of this work is cryptographic mechanisms design in post-quantum cryptography to provide basic ...
Serhii Yevseiev   +2 more
doaj   +1 more source

Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages

open access: yesApplied Sciences, 2020
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC).
ByeongGyu Park   +4 more
doaj   +1 more source

Code-Based Cryptography With Generalized Concatenated Codes for Restricted Error Values

open access: yesIEEE Open Journal of the Communications Society, 2022
Code-based cryptosystems are promising candidates for post-quantum cryptography. Recently, generalized concatenated codes over Gaussian and Eisenstein integers were proposed for those systems. For a channel model with errors of restricted weight, those q-
Johann-Philipp Thiers   +1 more
doaj   +1 more source

Post-quantum Cryptography: Code-Based Signatures [PDF]

open access: yes, 2010
This survey provides a comparative overview of code-based signature schemes with respect to security and performance. Furthermore, we explicitly describe serveral code-based signature schemes with additional properties such as identity-based, threshold ring and blind signatures.
Cayrel, Pierre-Louis, Meziani, Mohammed
openaire   +2 more sources

Post-Quantum Two-Party Adaptor Signature Based on Coding Theory

open access: yesCryptography, 2022
An adaptor signature can be viewed as a signature concealed with a secret value and, by design, any two of the trio yield the other. In a multiparty setting, an initial adaptor signature allows each party to create additional adaptor signatures without ...
Jean Belo Klamti, M. Anwar Hasan
doaj   +1 more source

Home - About - Disclaimer - Privacy