Results 51 to 60 of about 3,550 (163)
Some Notes on Code-Based Cryptography [PDF]
This thesis presents new cryptanalytic results in several areas of coding-based cryptography. In addition, we also investigate the possibility of using convolutional codes in code-based public-key cryptography. The first algorithm that we present is an information-set decoding algorithm, aiming towards the problem of decoding random linear codes.
openaire +2 more sources
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation
Classic McEliece is one of the three code-based candidates in the fourth round of the NIST post-quantum cryptography standardization process in the Key Encapsulation Mechanism category. As such, its decapsulation algorithm is used to recover the session
Vlad-Florin Drăgoi +4 more
doaj +1 more source
Code based Cryptography: Classic McEliece
This article addresses code-based cryptography and is designed to depict the complete outline of a code based public key cryptosystem. This report includes basic mathematics and fundamentals of coding theory which are useful for studying code-based cryptography.
openaire +2 more sources
Analisys and Implementation Cloud-based Biometricauthentication in Mobile Platform
Based on the Indonesian Central of Statistics the level of poverty people in September 2018 was 25.95 million, based on data, the government allocation care fund the reduce poverty people, the fund are given through the bank.
agostinho marques ximenes +3 more
doaj +1 more source
NeonCROSS: Vectorized Implementation of Post-Quantum Signature CROSS on Cortex-A72 and Apple M3
The advancement of quantum computing threatens traditional public-key cryptographic systems, prompting the development of post-quantum cryptography (PQC).
Hanyu Wei, Wenqian Li, Yunlei Zhao
doaj +1 more source
On the Performance and Security of Multiplication in GF(2N)
Multiplications in G F ( 2 N ) can be securely optimized for cryptographic applications when the integer N is small and does not match machine words (i.e., N < 32 ).
Jean-Luc Danger +8 more
doaj +1 more source
As the threat of building quantum computers which would break most of the used ciphers increases, so does the interest in an alternative solution. In the first part of this thesis, we consider Goppa codes which are error-correcting codes used in some post-quantum cryptosystems.
openaire +1 more source
VLSI IMPLEMENTATION OF NOVEL ROUND KEYS GENERATION SCHEME FOR CRYPTOGRAPHY APPLICATIONS BY ERROR CONTROL ALGORITHM [PDF]
A novel implementation of code based cryptography (Cryptocoding) technique for multi-layer key distribution scheme is presented. VLSI chip is designed for storing information on generation of round keys.
B. SENTHILKUMAR, V. RAJAMANI
doaj
Area and Speed Efficient FPGA Design of S-Box AES-256 Galois Field Approch Based on Logic
This paper Provides Compared S-box Galois Field Approach Based on LUT and Logic Gates for AES in terms of decreased chip size and decreased delay, which enhances performance. Data security is a fundamental requirement in the digital age.
Janshi Lakshmi K, Sreenivasulu G
doaj +1 more source
Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions
In the current landscape where quantum algorithms pose a significant threat to conventional digital signature algorithms, code-based digital signature algorithms have emerged as the primary focus of ongoing research in post-quantum cryptography.
Yong Wang, Eddie Shahril Ismail
doaj +1 more source

