Results 121 to 130 of about 8,486 (220)
Inverse matrices with applications in public-key cryptography
The applications of non-square binary matrices span many domains including mathematics, error-correction coding, machine learning, data storage, navigation signals, and cryptography.
Farshid Haidary Makoui +1 more
doaj +1 more source
Secure IoT in the Era of Quantum Computers-Where Are the Bottlenecks? [PDF]
Schöffel M +3 more
europepmc +1 more source
On the McEliece Public-Key Cryptosystem [PDF]
Based on an idea by Hin, the method of obtaining the original message after selecting k of n coordinates at random in the McEliece public-key cryptosystem is improved. The attack, which is more efficient than the attacks previously proposed, is characterized by a systematic method of checking and by a random bit swapping procedure.
openaire +1 more source
Quantum-resistance in blockchain networks. [PDF]
Allende M +13 more
europepmc +1 more source
Post-Quantum Security: Opportunities and Challenges. [PDF]
Li S +7 more
europepmc +1 more source
Punctured Syndrome Decoding Problem - Efficient Side-Channel Attacks Against Classic McEliece
Vincent Grosso +3 more
semanticscholar +1 more source
On Global Quantum Communication Networking. [PDF]
Djordjevic IB.
europepmc +1 more source
Probabilistically segregated neural circuits and subcritical linguistics. [PDF]
Baram Y.
europepmc +1 more source
Permutation-Based Block Code for Short Packet Communication Systems. [PDF]
Faure E +5 more
europepmc +1 more source

