Results 101 to 110 of about 3,178 (206)

Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and their subcodes

open access: yes, 2016
We give polynomial time attacks on the McEliece public key cryptosystem based either on algebraic geometry (AG) codes or on small codimensional subcodes of AG codes.
Couvreur, Alain   +2 more
core   +1 more source

Quantum Neural Network Based Distinguisher on SPECK-32/64. [PDF]

open access: yesSensors (Basel), 2023
Kim H   +5 more
europepmc   +1 more source

Year 2010 Issues on Cryptographic Algorithms [PDF]

open access: yes
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core  

Entropy in Image Analysis III. [PDF]

open access: yesEntropy (Basel), 2021
Sparavigna AC.
europepmc   +1 more source

The Odyssey of Entropy: Cryptography. [PDF]

open access: yesEntropy (Basel), 2022
Zolfaghari B, Bibak K, Koshiba T.
europepmc   +1 more source

Home - About - Disclaimer - Privacy