Results 21 to 30 of about 69,698 (279)
Underwater Hacker Missile Wars: A Cryptography and Engineering Contest [PDF]
For a recent student conference, the authors developed a day-long design problem and competition suitable for engineering, mathematics and science undergraduates.
Holden, Joshua +3 more
core +1 more source
From Quantum Cheating to Quantum Security [PDF]
For thousands of years, code-makers and code-breakers have been competing for supremacy. Their arsenals may soon include a powerful new weapon: quantum mechanics. We give an overview of quantum cryptology as of November 2000.Comment: 14 pages, 4 figures.
Gottesman, Daniel, Lo, Hoi-Kwong
core +4 more sources
Post-quantum Cryptography: Code-Based Signatures [PDF]
This survey provides a comparative overview of code-based signature schemes with respect to security and performance. Furthermore, we explicitly describe serveral code-based signature schemes with additional properties such as identity-based, threshold ring and blind signatures.
Cayrel, Pierre-Louis, Meziani, Mohammed
openaire +2 more sources
Post-Quantum Two-Party Adaptor Signature Based on Coding Theory
An adaptor signature can be viewed as a signature concealed with a secret value and, by design, any two of the trio yield the other. In a multiparty setting, an initial adaptor signature allows each party to create additional adaptor signatures without ...
Jean Belo Klamti, M. Anwar Hasan
doaj +1 more source
McBits: Fast Constant-Time Code-Based Cryptography [PDF]
This paper presents extremely fast algorithms for code-based public-key cryptography, including full protection against timing attacks. For example, at a 2^128 security level, this paper achieves a reciprocal decryption throughput of just 60493 cycles (plus cipher cost etc.) on a single Ivy Bridge core. These algorithms rely on an additive FFT for fast
Bernstein, D. J., Chou, T., Schwabe, P.
openaire +3 more sources
Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment
The design of a practical code-based signature scheme is an open problem in post-quantum cryptography. This paper is the full version of a work appeared at SIN’18 as a short paper, which introduced a simple and efficient one-time secure signature ...
Edoardo Persichetti
doaj +1 more source
A Summary of McEliece-Type Cryptosystems and their Security
In this paper we give an overview of some of the cryptographic applications which were derived from the proposal of R. J. McEliece to use error correcting codes for cryptographic purposes.
Engelbert D., Overbeck R., Schmidt A.
doaj +1 more source
Development of digital signature algorithm based on the Niederriter crypto-code system
The development of computing resources in the post-quantum period calls into question the provision of the required level of stability of symmetric and asymmetric cryptography algorithms. The advent of a full-scale quantum computer based on the Shore and
О.С. Циганенко
doaj +1 more source
Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography [PDF]
Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is ...
Emuoyibofarhe, Justice +2 more
core +2 more sources
DAGS: Key encapsulation using dyadic GS codes
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo +12 more
doaj +1 more source

