Results 281 to 290 of about 963,035 (329)
Some of the next articles are maybe not open access.

Code-Based Cryptography

Lecture Notes in Computer Science, 2019
T. Lange, T. Chou, C. Peters
semanticscholar   +2 more sources

Code-based cryptography

, 2009
Raphael Overbeck, N. Sendrier
semanticscholar   +2 more sources

QC-LDPC Code-Based Cryptography

Springer Briefs in Electrical and Computer Engineering, 2014
M. Baldi
semanticscholar   +2 more sources

Critical attacks in code-based cryptography

International Journal of Information and Coding Theory, 2015
Summary: Code-based cryptographic schemes are promising candidates for post-quantum cryptography since they are fast, require only basic arithmetic, and have a well understood security. While there is strong evidence that cryptosystems like McEliece and Niederreiter are secure, they have certain weaknesses when used without semantic conversions ...
Pierre-Louis Cayrel   +3 more
semanticscholar   +3 more sources

Cryptography With McEliece Algorithm (Code Based Cryptography)

Jurnal Teknik Indonesia, 2023
The McEliece algorithm is one of the code-based cryptography methods that offers a high level of security, especially against quantum computing threats. This algorithm uses error-correcting codes to encrypt messages, making them difficult to crack by conventional cryptanalysis attacks.
null Priska Gultom   +3 more
openaire   +1 more source

Rank-metric Encryption on Arm-Cortex M0: Porting code-based cryptography to lightweight devices

APKC@AsiaCCS, 2019
Since its invention by McEliece in 1978, cryptography based on Error Correcting Codes (ECC) has suffered from the reputation of not being suitable for constrained devices.
A. A. Abdouli   +4 more
semanticscholar   +1 more source

A Robust Approach to Cloud Data Securityusing an Amalgamation of AES and Code-Based Cryptography

2024 International Conference on Science Technology Engineering and Management (ICSTEM)
Data security in cloud environments is a critical concern that increases dependence on cloud services and the persistent threat. The purpose of this paper is to present a new approach that uses the McEliece cryptosystem a form of code-based cryptography,
Mahesh Muthulakshmi R, Anithaashri T. P
semanticscholar   +1 more source

Pseudorandomness of Decoding, Revisited: Adapting OHCP to Code-Based Cryptography

International Conference on the Theory and Application of Cryptology and Information Security, 2023
Maxime Bombar   +2 more
semanticscholar   +1 more source

New Code Based Fuzzy Extractor for Biometric Cryptography

2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), 2018
In this paper methods of forming cryptographic keys from biometric images using fuzzy extractors are considered. A new scheme of a fuzzy extractor based on the McEIiece cryptosystem is proposed. It is shown that the new design of the fuzzy extractor allows forming cryptographic passwords from biometric images even without the use of non-secret helper ...
Alexandr Kuznetsov   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy