Results 281 to 290 of about 963,035 (329)
Some of the next articles are maybe not open access.
QC-LDPC Code-Based Cryptography
Springer Briefs in Electrical and Computer Engineering, 2014M. Baldi
semanticscholar +2 more sources
Critical attacks in code-based cryptography
International Journal of Information and Coding Theory, 2015Summary: Code-based cryptographic schemes are promising candidates for post-quantum cryptography since they are fast, require only basic arithmetic, and have a well understood security. While there is strong evidence that cryptosystems like McEliece and Niederreiter are secure, they have certain weaknesses when used without semantic conversions ...
Pierre-Louis Cayrel +3 more
semanticscholar +3 more sources
Cryptography With McEliece Algorithm (Code Based Cryptography)
Jurnal Teknik Indonesia, 2023The McEliece algorithm is one of the code-based cryptography methods that offers a high level of security, especially against quantum computing threats. This algorithm uses error-correcting codes to encrypt messages, making them difficult to crack by conventional cryptanalysis attacks.
null Priska Gultom +3 more
openaire +1 more source
Rank-metric Encryption on Arm-Cortex M0: Porting code-based cryptography to lightweight devices
APKC@AsiaCCS, 2019Since its invention by McEliece in 1978, cryptography based on Error Correcting Codes (ECC) has suffered from the reputation of not being suitable for constrained devices.
A. A. Abdouli +4 more
semanticscholar +1 more source
A Robust Approach to Cloud Data Securityusing an Amalgamation of AES and Code-Based Cryptography
2024 International Conference on Science Technology Engineering and Management (ICSTEM)Data security in cloud environments is a critical concern that increases dependence on cloud services and the persistent threat. The purpose of this paper is to present a new approach that uses the McEliece cryptosystem a form of code-based cryptography,
Mahesh Muthulakshmi R, Anithaashri T. P
semanticscholar +1 more source
Pseudorandomness of Decoding, Revisited: Adapting OHCP to Code-Based Cryptography
International Conference on the Theory and Application of Cryptology and Information Security, 2023Maxime Bombar +2 more
semanticscholar +1 more source
New Code Based Fuzzy Extractor for Biometric Cryptography
2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), 2018In this paper methods of forming cryptographic keys from biometric images using fuzzy extractors are considered. A new scheme of a fuzzy extractor based on the McEIiece cryptosystem is proposed. It is shown that the new design of the fuzzy extractor allows forming cryptographic passwords from biometric images even without the use of non-secret helper ...
Alexandr Kuznetsov +4 more
openaire +1 more source
Code-Based Cryptography: State of the Art and Perspectives
IEEE Security and Privacy, 2017N. Sendrier
semanticscholar +1 more source

