Results 31 to 40 of about 69,698 (279)

Anti-Quantum Signcryption Scheme Based on Niederreiter Cryptosystem [PDF]

open access: yesJisuanji gongcheng, 2020
To address security issues of network communication in the post-quantum era,this paper studies the Niederreiter cryptosystem in code-based cryptography,and combines the double public key cryptographic scheme based on the improved Niederreiter scheme with
WANG Zhong, HAN Yiliang
doaj   +1 more source

Problem-Based Teaching through Video Podcasts for Coding and Cryptography [PDF]

open access: yes, 2018
In this work we present the development and preliminary evaluation of several problem-based video podcasts addressed to students of the subject “Coding and Cryptography”.
Gutiérrez García, Francisco Javier   +4 more
core   +2 more sources

Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory [PDF]

open access: yes, 2020
The present survey reports on the state of the art of the different cryptographic functionalities built upon the ring learning with errors problem and its interplay with several classical problems in algebraic number theory.
Chacón, Iván Blanco
core   +2 more sources

Code-based Post-Quantum Cryptography

open access: yes, 2021
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or in transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems based on modular arithmetic to the contemporary cryptosystems based on quantum computing.
Balamurugan, Chithralekha   +3 more
openaire   +2 more sources

A Biological-Inspired Cryptosystem based on DNA Cryptography and Morse Code Ciphering Technique

open access: yesASM Science Journal, 2022
Due to its prominent facility to hide colossal datasets with a high calibre of randomness and subsequent protection, the famous genomic Deoxyribonucleic Acid (DNA) has been presented as a hiding medium, known as DNA steganography.
Adithya B   +1 more
doaj   +1 more source

Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography

open access: yesCryptography, 2021
The code-based McEliece and Niederreiter cryptosystems are promising candidates for post-quantum public-key encryption. Recently, q-ary concatenated codes over Gaussian integers were proposed for the McEliece cryptosystem, together with the one-Mannheim ...
Johann-Philipp Thiers   +1 more
doaj   +1 more source

Agri-Food Traceability Management using a RFID System with Privacy Protection [PDF]

open access: yes, 2007
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in food, an efficient tracking and tracing system is required.
Bernardi, Paolo   +5 more
core   +2 more sources

Designing Efficient Dyadic Operations for Cryptographic Applications

open access: yesJournal of Mathematical Cryptology, 2020
Cryptographic primitives from coding theory are some of the most promising candidates for NIST’s Post-Quantum Cryptography Standardization process. In this paper, we introduce a variety of techniques to improve operations on dyadic matrices, a particular
Banegas Gustavo   +3 more
doaj   +1 more source

Twisted Hermitian Codes

open access: yesMathematics, 2020
We define a family of codes called twisted Hermitian codes, which are based on Hermitian codes and inspired by the twisted Reed–Solomon codes described by Beelen, Puchinger, and Nielsen. We demonstrate that these new codes can have high-dimensional Schur
Austin Allen   +6 more
doaj   +1 more source

Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Chou suggested a constant-time implementation for quasi-cyclic moderatedensity parity-check (QC-MDPC) code-based cryptography to mitigate timing attacks at CHES 2016.
Bo-Yeon Sim   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy