Results 111 to 120 of about 8,486 (220)
Quantum McEliece public-key encryption scheme
18pages, no ...
Yang, Li, Liang, Min
openaire +2 more sources
Public-Key Cryptosystems and Bounded Distance Decoding of Linear Codes. [PDF]
Çalkavur S.
europepmc +1 more source
Post-Quantum Encryption Algorithms
The most used asymmetric encryption algorithm nowadays is RSA. It may become insecure regarding advances in the field of quantum computers. It is the reason why the National Institute of Standards and Technologies introduces the challenges of choosing a ...
Pekarčík Peter, Chovancová Eva
doaj +1 more source
Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain. [PDF]
Xu S +5 more
europepmc +1 more source
Code-based generalized signcryption scheme with multi-receiver
In order to solve the problem of secure transmission of messages with multiple receivers,a code-based generalized signcryption scheme with multi-receiver was designed.Firstly,a multi-encrypted McEliece scheme that can meet the security of IND-CCA2 was ...
Yiliang HAN, Zhong WANG
doaj +2 more sources
A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications. [PDF]
Septien-Hernandez JA +3 more
europepmc +1 more source
Matris kodlar ile mceliece şifreleme sistemi
Bilgi çağında yaşadığımız bu günlerde bilginin transferi (internet, cep telefonları, bankacılık vs. ) ya da depolanması (CD vs.) aşamasında meydana gelebilecek bilgi zedelenmelerini koruma ve düzeltme amacıyla kodlama kullanılmaktadır. Bu anlamda kullanılan kodlar içinde lineer kodlar önemli bir yer tutmaktadır.
openaire +2 more sources
Code based Cryptography: Classic McEliece
This article addresses code-based cryptography and is designed to depict the complete outline of a code based public key cryptosystem. This report includes basic mathematics and fundamentals of coding theory which are useful for studying code-based cryptography.
openaire +2 more sources
A class of channel models is presented which exhibit varying burst error severity much like channels encountered in practice. An information-theoretic analysis of these channel models is made, and conclusions are drawn that may aid in the design of coded
Mceliece, R. J.
core +1 more source
McEliece public key cryptosystem attack algorithm based on enumeration error vector
The research on the security of McEliece (M) public key cryptosystem was presented. The Hamming weight of error vector is less than the code length, and M public key cryptosystem based on Goppa code possesses low weight public code words. Considering the
Jing-mei LIU +3 more
doaj +2 more sources

