Results 121 to 130 of about 8,486 (220)

Inverse matrices with applications in public-key cryptography

open access: yesJournal of Algorithms & Computational Technology
The applications of non-square binary matrices span many domains including mathematics, error-correction coding, machine learning, data storage, navigation signals, and cryptography.
Farshid Haidary Makoui   +1 more
doaj   +1 more source

Secure IoT in the Era of Quantum Computers-Where Are the Bottlenecks? [PDF]

open access: yesSensors (Basel), 2022
Schöffel M   +3 more
europepmc   +1 more source

On the McEliece Public-Key Cryptosystem [PDF]

open access: yes, 1990
Based on an idea by Hin, the method of obtaining the original message after selecting k of n coordinates at random in the McEliece public-key cryptosystem is improved. The attack, which is more efficient than the attacks previously proposed, is characterized by a systematic method of checking and by a random bit swapping procedure.
openaire   +1 more source

Quantum-resistance in blockchain networks. [PDF]

open access: yesSci Rep, 2023
Allende M   +13 more
europepmc   +1 more source

Post-Quantum Security: Opportunities and Challenges. [PDF]

open access: yesSensors (Basel), 2023
Li S   +7 more
europepmc   +1 more source

Punctured Syndrome Decoding Problem - Efficient Side-Channel Attacks Against Classic McEliece

open access: yesInternational Workshop on Constructive Side-Channel Analysis and Secure Design, 2023
Vincent Grosso   +3 more
semanticscholar   +1 more source

Lattice-based PKEs/KEMs. [PDF]

open access: yesNatl Sci Rev, 2021
Lu X, Zhang J.
europepmc   +1 more source

Permutation-Based Block Code for Short Packet Communication Systems. [PDF]

open access: yesSensors (Basel), 2022
Faure E   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy