Results 271 to 280 of about 963,035 (329)
Mitigating security flaws in Baptista's chaotic cryptosystem through superior and alternated logistic map approaches. [PDF]
Verma DK +4 more
europepmc +1 more source
Genomic privacy and security in the era of artificial intelligence and quantum computing. [PDF]
Annan R +5 more
europepmc +1 more source
New protocols and new attacks on rank metric code-based cryptography
Adrien Hauteville
openalex +1 more source
Cryptographic protocols based on rank-metric error correcting codes
Adrien Vinçotte
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cryptography With Mceliece Algorithm (Code Based Cryptography)
Jurnal Teknik IndonesiaCryptography is the science used to protect information from unauthorized access. One promising cryptographic algorithm is the McEliece algorithm, which uses code-based cryptography.
Caleg Sadrak Sinaga +8 more
semanticscholar +2 more sources
Modern Cryptography with Proof Techniques and Applications, 2021
This chapter focuses on the essentials of code-based cryptography and on coding theory and the associated hard problems useful for cryptography as well as more recent proposals for public-key cryptography, key-exchange protocols, and digital signatures. Code-based cryptography was originally proposed using the standard Hamming metric. The M.
S. Hwang, Intae Kim, W. Lee
semanticscholar +4 more sources
This chapter focuses on the essentials of code-based cryptography and on coding theory and the associated hard problems useful for cryptography as well as more recent proposals for public-key cryptography, key-exchange protocols, and digital signatures. Code-based cryptography was originally proposed using the standard Hamming metric. The M.
S. Hwang, Intae Kim, W. Lee
semanticscholar +4 more sources

