Results 21 to 30 of about 69,698 (279)

Underwater Hacker Missile Wars: A Cryptography and Engineering Contest [PDF]

open access: yes, 2005
For a recent student conference, the authors developed a day-long design problem and competition suitable for engineering, mathematics and science undergraduates.
Holden, Joshua   +3 more
core   +1 more source

From Quantum Cheating to Quantum Security [PDF]

open access: yes, 2000
For thousands of years, code-makers and code-breakers have been competing for supremacy. Their arsenals may soon include a powerful new weapon: quantum mechanics. We give an overview of quantum cryptology as of November 2000.Comment: 14 pages, 4 figures.
Gottesman, Daniel, Lo, Hoi-Kwong
core   +4 more sources

Post-quantum Cryptography: Code-Based Signatures [PDF]

open access: yes, 2010
This survey provides a comparative overview of code-based signature schemes with respect to security and performance. Furthermore, we explicitly describe serveral code-based signature schemes with additional properties such as identity-based, threshold ring and blind signatures.
Cayrel, Pierre-Louis, Meziani, Mohammed
openaire   +2 more sources

Post-Quantum Two-Party Adaptor Signature Based on Coding Theory

open access: yesCryptography, 2022
An adaptor signature can be viewed as a signature concealed with a secret value and, by design, any two of the trio yield the other. In a multiparty setting, an initial adaptor signature allows each party to create additional adaptor signatures without ...
Jean Belo Klamti, M. Anwar Hasan
doaj   +1 more source

McBits: Fast Constant-Time Code-Based Cryptography [PDF]

open access: yes, 2013
This paper presents extremely fast algorithms for code-based public-key cryptography, including full protection against timing attacks. For example, at a 2^128 security level, this paper achieves a reciprocal decryption throughput of just 60493 cycles (plus cipher cost etc.) on a single Ivy Bridge core. These algorithms rely on an additive FFT for fast
Bernstein, D. J., Chou, T., Schwabe, P.
openaire   +3 more sources

Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment

open access: yesCryptography, 2018
The design of a practical code-based signature scheme is an open problem in post-quantum cryptography. This paper is the full version of a work appeared at SIN’18 as a short paper, which introduced a simple and efficient one-time secure signature ...
Edoardo Persichetti
doaj   +1 more source

A Summary of McEliece-Type Cryptosystems and their Security

open access: yesJournal of Mathematical Cryptology, 2007
In this paper we give an overview of some of the cryptographic applications which were derived from the proposal of R. J. McEliece to use error correcting codes for cryptographic purposes.
Engelbert D., Overbeck R., Schmidt A.
doaj   +1 more source

Development of digital signature algorithm based on the Niederriter crypto-code system

open access: yesСистеми обробки інформації, 2020
The development of computing resources in the post-quantum period calls into question the provision of the required level of stability of symmetric and asymmetric cryptography algorithms. The advent of a full-scale quantum computer based on the Shore and
О.С. Циганенко
doaj   +1 more source

Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography [PDF]

open access: yes, 2017
Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is ...
Emuoyibofarhe, Justice   +2 more
core   +2 more sources

DAGS: Key encapsulation using dyadic GS codes

open access: yesJournal of Mathematical Cryptology, 2018
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo   +12 more
doaj   +1 more source

Home - About - Disclaimer - Privacy