Results 31 to 40 of about 963,035 (329)

Modified pqsigRM: RM Code-Based Signature Scheme

open access: yesIEEE Access, 2020
We present a novel code-based signature scheme called modified pqsigRM. This scheme is based on a modified Reed-Muller (RM) code, which reduces the signing complexity and key size compared with existing code-based signature schemes.
Yongwoo Lee   +3 more
doaj   +1 more source

Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions

open access: yesApplied Sciences, 2021
Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. In support of public key infrastructures, the distribution, validation and storage of the cryptographic keys ...
Bertrand Cambou   +8 more
doaj   +1 more source

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals [PDF]

open access: yesJournal of Artificial Intelligence and Data Mining, 2020
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography
M. Zeynali   +2 more
doaj   +1 more source

A Mathematical Perspective on Post-Quantum Cryptography

open access: yesMathematics, 2022
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography.
Maximilian Richter   +3 more
doaj   +1 more source

Providing Authentication & Authorization Mechanisms for Active Service Charging [PDF]

open access: yes, 2002
Active network technology enables fast deployment of new network services tailored to the specific needs of end users, among others features.
Alarcos, Bernardo   +3 more
core   +3 more sources

MATHEMATICAL MODELS OF HYBRID CRYPTO CODE CONSTRUCTIONS ON DAMAGED CODES

open access: yesСучасні інформаційні системи, 2019
The subject are mathematical models of building hybrid (complex) cryptosystems based on Mac-Elis crypto-code constructions on damaged codes. The purpose of this work is cryptographic mechanisms design in post-quantum cryptography to provide basic ...
Serhii Yevseiev   +2 more
doaj   +1 more source

Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages

open access: yesApplied Sciences, 2020
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC).
ByeongGyu Park   +4 more
doaj   +1 more source

Ternary Syndrome Decoding with Large Weight [PDF]

open access: yes, 2019
The Syndrome Decoding problem is at the core of many code-based cryptosystems. In this paper, we study ternary Syndrome Decoding in large weight. This problem has been introduced in the Wave signature scheme but has never been thoroughly studied.
A Becker   +17 more
core   +4 more sources

Post-Quantum Two-Party Adaptor Signature Based on Coding Theory

open access: yesCryptography, 2022
An adaptor signature can be viewed as a signature concealed with a secret value and, by design, any two of the trio yield the other. In a multiparty setting, an initial adaptor signature allows each party to create additional adaptor signatures without ...
Jean Belo Klamti, M. Anwar Hasan
doaj   +1 more source

A Summary of McEliece-Type Cryptosystems and their Security

open access: yesJournal of Mathematical Cryptology, 2007
In this paper we give an overview of some of the cryptographic applications which were derived from the proposal of R. J. McEliece to use error correcting codes for cryptographic purposes.
Engelbert D., Overbeck R., Schmidt A.
doaj   +1 more source

Home - About - Disclaimer - Privacy