Results 51 to 60 of about 3,550 (163)

Some Notes on Code-Based Cryptography [PDF]

open access: yes, 2015
This thesis presents new cryptanalytic results in several areas of coding-based cryptography. In addition, we also investigate the possibility of using convolutional codes in code-based public-key cryptography. The first algorithm that we present is an information-set decoding algorithm, aiming towards the problem of decoding random linear codes.
openaire   +2 more sources

Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Classic McEliece is one of the three code-based candidates in the fourth round of the NIST post-quantum cryptography standardization process in the Key Encapsulation Mechanism category. As such, its decapsulation algorithm is used to recover the session
Vlad-Florin Drăgoi   +4 more
doaj   +1 more source

Code based Cryptography: Classic McEliece

open access: yes, 2019
This article addresses code-based cryptography and is designed to depict the complete outline of a code based public key cryptosystem. This report includes basic mathematics and fundamentals of coding theory which are useful for studying code-based cryptography.
openaire   +2 more sources

Analisys and Implementation Cloud-based Biometricauthentication in Mobile Platform

open access: yesJurnal Ilmiah Kursor: Menuju Solusi Teknologi Informasi, 2019
Based on the Indonesian Central of Statistics the level of poverty people in September 2018 was 25.95 million, based on data, the government allocation care fund the reduce poverty people, the fund are given through the bank.
agostinho marques ximenes   +3 more
doaj   +1 more source

NeonCROSS: Vectorized Implementation of Post-Quantum Signature CROSS on Cortex-A72 and Apple M3

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
The advancement of quantum computing threatens traditional public-key cryptographic systems, prompting the development of post-quantum cryptography (PQC).
Hanyu Wei, Wenqian Li, Yunlei Zhao
doaj   +1 more source

On the Performance and Security of Multiplication in GF(2N)

open access: yesCryptography, 2018
Multiplications in G F ( 2 N ) can be securely optimized for cryptographic applications when the integer N is small and does not match machine words (i.e., N < 32 ).
Jean-Luc Danger   +8 more
doaj   +1 more source

Code-based cryptography

open access: yes, 2018
As the threat of building quantum computers which would break most of the used ciphers increases, so does the interest in an alternative solution. In the first part of this thesis, we consider Goppa codes which are error-correcting codes used in some post-quantum cryptosystems.
openaire   +1 more source

VLSI IMPLEMENTATION OF NOVEL ROUND KEYS GENERATION SCHEME FOR CRYPTOGRAPHY APPLICATIONS BY ERROR CONTROL ALGORITHM [PDF]

open access: yesJournal of Engineering Science and Technology, 2015
A novel implementation of code based cryptography (Cryptocoding) technique for multi-layer key distribution scheme is presented. VLSI chip is designed for storing information on generation of round keys.
B. SENTHILKUMAR, V. RAJAMANI
doaj  

Area and Speed Efficient FPGA Design of S-Box AES-256 Galois Field Approch Based on Logic

open access: yesITEGAM-JETIA
This paper Provides Compared  S-box Galois Field Approach Based on LUT and Logic Gates for AES in terms of decreased chip size and decreased delay, which enhances performance. Data security is a fundamental requirement in the digital age.
Janshi Lakshmi K, Sreenivasulu G
doaj   +1 more source

Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions

open access: yesMathematics
In the current landscape where quantum algorithms pose a significant threat to conventional digital signature algorithms, code-based digital signature algorithms have emerged as the primary focus of ongoing research in post-quantum cryptography.
Yong Wang, Eddie Shahril Ismail
doaj   +1 more source

Home - About - Disclaimer - Privacy