Results 111 to 120 of about 8,486 (220)

Quantum McEliece public-key encryption scheme

open access: yes, 2015
18pages, no ...
Yang, Li, Liang, Min
openaire   +2 more sources

Post-Quantum Encryption Algorithms

open access: yesActa Electrotechnica et Informatica
The most used asymmetric encryption algorithm nowadays is RSA. It may become insecure regarding advances in the field of quantum computers. It is the reason why the National Institute of Standards and Technologies introduces the challenges of choosing a ...
Pekarčík Peter, Chovancová Eva
doaj   +1 more source

Code-based generalized signcryption scheme with multi-receiver

open access: yesTongxin xuebao, 2020
In order to solve the problem of secure transmission of messages with multiple receivers,a code-based generalized signcryption scheme with multi-receiver was designed.Firstly,a multi-encrypted McEliece scheme that can meet the security of IND-CCA2 was ...
Yiliang HAN, Zhong WANG
doaj   +2 more sources

A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications. [PDF]

open access: yesSensors (Basel), 2022
Septien-Hernandez JA   +3 more
europepmc   +1 more source

Matris kodlar ile mceliece şifreleme sistemi

open access: yes, 2020
Bilgi çağında yaşadığımız bu günlerde bilginin transferi (internet, cep telefonları, bankacılık vs. ) ya da depolanması (CD vs.) aşamasında meydana gelebilecek bilgi zedelenmelerini koruma ve düzeltme amacıyla kodlama kullanılmaktadır. Bu anlamda kullanılan kodlar içinde lineer kodlar önemli bir yer tutmaktadır.
openaire   +2 more sources

Code based Cryptography: Classic McEliece

open access: yes, 2019
This article addresses code-based cryptography and is designed to depict the complete outline of a code based public key cryptosystem. This report includes basic mathematics and fundamentals of coding theory which are useful for studying code-based cryptography.
openaire   +2 more sources

RFI channels [PDF]

open access: yes
A class of channel models is presented which exhibit varying burst error severity much like channels encountered in practice. An information-theoretic analysis of these channel models is made, and conclusions are drawn that may aid in the design of coded
Mceliece, R. J.
core   +1 more source

McEliece public key cryptosystem attack algorithm based on enumeration error vector

open access: yesTongxin xuebao, 2014
The research on the security of McEliece (M) public key cryptosystem was presented. The Hamming weight of error vector is less than the code length, and M public key cryptosystem based on Goppa code possesses low weight public code words. Considering the
Jing-mei LIU   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy