Results 31 to 40 of about 3,550 (163)

Twisted Hermitian Codes

open access: yesMathematics, 2020
We define a family of codes called twisted Hermitian codes, which are based on Hermitian codes and inspired by the twisted Reed–Solomon codes described by Beelen, Puchinger, and Nielsen. We demonstrate that these new codes can have high-dimensional Schur
Austin Allen   +6 more
doaj   +1 more source

Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Chou suggested a constant-time implementation for quasi-cyclic moderatedensity parity-check (QC-MDPC) code-based cryptography to mitigate timing attacks at CHES 2016.
Bo-Yeon Sim   +5 more
doaj   +1 more source

Provably secure identity-based identification and signature schemes from code assumptions. [PDF]

open access: yesPLoS ONE, 2017
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/
Bo Song, Yiming Zhao
doaj   +1 more source

Rank AGS Identification Scheme and Signature Scheme

open access: yesMathematics, 2023
The identification protocol is a type of zero-knowledge proof. One party (the prover) needs to prove his identity to another party (the verifier) without revealing the secret key to the verifier. One can apply the Fiat–Shamir transformation to convert an
Vaishnavi Nagaraja   +6 more
doaj   +1 more source

Code-based Cryptography: Lecture Notes

open access: yes, 2023
These lecture notes have been written for courses given at École normale supérieure de Lyon and summer school 2022 in post-quantum cryptography that took place in the university of Budapest. Our objective is to give a general introduction to the foundations of code-based cryptography which is currently known to be secure even against quantum ...
openaire   +2 more sources

A Survey on Code-Based Cryptography

open access: yes, 2022
The improvements on quantum technology are threatening our daily cybersecurity, as a capable quantum computer can break all currently employed asymmetric cryptosystems. In preparation for the quantum-era the National Institute of Standards and Technology (NIST) has initiated in 2016 a standardization process for public-key encryption (PKE) schemes, key-
Weger, Violetta   +2 more
openaire   +2 more sources

A New Code-Based Identity-Based Signature Scheme from the Ternary Large-Weight SDP

open access: yesCryptography
Identity-based cryptography introduced by Shamir (Crypto’84) has seen many advances through the years. In the context of post-quantum identity-based schemes, most of the efficient designs are based on lattices.
Sana Challi   +2 more
doaj   +1 more source

A code-based hybrid signcryption scheme

open access: yesJournal of Mathematical Cryptology, 2023
A key encapsulation mechanism (KEM{\mathsf{KEM}}) that takes as input an arbitrary string, i.e., a tag, is known as tag-KEM{\mathsf{KEM}}, while a scheme that combines signature and encryption is called signcryption.
Klamti Jean Belo, Hasan M. Anwarul
doaj   +1 more source

Optical Bit-Plane-Based 3D-JST Cryptography Algorithm With Cascaded 2D-FrFT Encryption for Efficient and Secure HEVC Communication

open access: yesIEEE Access, 2021
The rapid growth of multimedia communication systems has expanded the High-Efficiency Video Coding (HEVC) security applications precipitously. Therefore, there is an urgent, elevated need to protect and secure the HEVC content during streaming and ...
Walid El-Shafai   +2 more
doaj   +1 more source

Efficient and Scalable FPGA-Oriented Design of QC-LDPC Bit-Flipping Decoders for Post-Quantum Cryptography

open access: yesIEEE Access, 2020
Considering code-based cryptography, quasi-cyclic low-density parity-check (QC-LDPC) codes are foreseen as one of the few solutions to design post-quantum cryptosystems.
Davide Zoni   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy