Results 41 to 50 of about 3,550 (163)

A Lossless-Recovery Secret Distribution Scheme Based on QR Codes

open access: yesEntropy, 2023
The visual cryptography scheme (VCS) distributes a secret to several images that can enhance the secure transmission of that secret. Quick response (QR) codes are widespread. VCS can be used to improve their secure transmission.
Jeng-Shyang Pan   +4 more
doaj   +1 more source

Reproducible families of codes and cryptographic applications

open access: yesJournal of Mathematical Cryptology, 2021
Structured linear block codes such as cyclic, quasi-cyclic and quasi-dyadic codes have gained an increasing role in recent years both in the context of error control and in that of code-based cryptography.
Santini Paolo   +2 more
doaj   +1 more source

Code Based Cryptography and Steganography [PDF]

open access: yes, 2013
For a long time, coding theory was only concerned by message integrity (how to protect against errors a message sent via some noisely channel). Nowadays, coding theory plays an important role in the area of cryptography and steganography. The aim of this paper is to show how algebraic coding theory offers ways to define secure cryptographic primitives ...
openaire   +1 more source

Polynomial Structures in Code-Based Cryptography [PDF]

open access: yes, 2013
In this article we discus a probability problem applied in the code based cryptography. It is related to the shape of the polynomials with exactly t different roots. We will show that the structure is very dense and the probability that this type of polynomials has at least one coefficient equal to zero is extremelly low.
Vlad Dragoi   +3 more
openaire   +1 more source

Code based fuzzy extractor for biometric cryptography

open access: yesРадіотехніка, 2018
Methods of forming cryptographic keys of biometric images using fuzzy extractors are considered. A new scheme of a fuzzy extractor based on the McEliece cryptosystem is proposed. It is shown that the new design of the fuzzy extractor allows forming cryptographic passwords from biometric images even without the use of non-secret helper string.
А.А. Kuznetsov   +2 more
openaire   +3 more sources

Recent Progress in Code-Based Cryptography [PDF]

open access: yes, 2011
The last three years have witnessed tremendous progress in the understanding of code-based cryptography. One of its most promising applications is the design of cryptographic schemes with exceptionally strong security guarantees and other desirable properties.
Pierre-Louis Cayrel   +4 more
openaire   +1 more source

Mathematical models of message authentication in the post-quantum cryptosystems based on error-correcting coding

open access: yesНаука. Инновации. Технологии, 2022
The paper discusses possibilities for use of message authentication signatures schemes based on error-correcting coding which may be candidates for use in post-quantum cryptography.
Aleksandr Aleksandrovich Kuznetsov   +2 more
doaj  

An Innovative Near-Field Communication Security Based on the Chaos Generated by Memristive Circuits Adopted as Symmetrical Key

open access: yesIEEE Access, 2020
The new technology solutions are playing an important role in the hardware security. One of the latest techniques is the use of the Memristor as an encryption element.
Colin Sokol Kuka   +3 more
doaj   +1 more source

Lossy Cryptography from Code-Based Assumptions

open access: yes
Over the past few decades, we have seen a proliferation of advanced cryptographic primitives with lossy or homomorphic properties built from various assumptions such as Quadratic Residuosity, Decisional Diffie-Hellman, and Learning with Errors. These primitives imply hard problems in the complexity class $SZK$ (statistical zero-knowledge); as a ...
Dao, Quang, Jain, Aayush
openaire   +2 more sources

Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process

open access: yesTechnologies
As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC).
Kanza Cherkaoui Dekkaki   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy