Results 171 to 180 of about 8,486 (220)
Some of the next articles are maybe not open access.
Breaking Goppa-based McEliece with hints
Information and Computation, 2023. We consider the McEliece cryptosystem with a binary Goppa code C ⊂ F n 2 specified by an irreducible Goppa polynomial g ( x ) ∈ F 2 m [ X ] and Goppa points ( α 1 , . . . , α n ) ∈ F n 2 m .
E. Kirshanova, Alexander May
semanticscholar +3 more sources
Mckeycutter: A High-throughput Key Generator of Classic McEliece on Hardware
Design Automation Conference, 2023Classic McEliece is a code-based quantum-resistant public-key scheme characterized with relative high encapsulation/decapsulation speed and small ciphertexts, with an in-depth analysis on its security.
Yihong Zhu +6 more
semanticscholar +1 more source
Sparsity-Aware Medium-Density Parity-Check Decoder for McEliece Cryptosystems
IEEE Transactions on Circuits and Systems - II - Express Briefs, 2023McEliece cryptosystem based on medium-density parity-check (MDPC) codes is one of the finalists for the post-quantum cryptography standard. Although decoder design for low-density parity-check (LDPC) codes used for digital communications is well ...
Xinmiao Zhang, Zhenshan Xie
semanticscholar +1 more source
Low-Complexity Parallel Min-Sum Medium-Density Parity-Check Decoder for McEliece Cryptosystem
IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 2023The McEliece cryptosystem based on medium-density parity-check (MDPC) codes remains a candidate in the fourth round submission of post-quantum cryptography standard.
Jiaxuan Cai, Xinmiao Zhang
semanticscholar +1 more source
Security analysis of the Classic McEliece, HQC and BIKE schemes in low memory
IACR Cryptology ePrint Archive, 2023With the advancement of NIST PQC standardization, three of the four candidates in Round 4 are code-based schemes, namely Classic McEliece, HQC and BIKE.
Yu Li, Li-Ping Wang
semanticscholar +1 more source
McEliece-type cryptosystem based on correction of errors and erasures
International Symposium "Problems of Redundancy in Information and Control Systems", 2023Recently, a modification of the classical McEliece cryptosystem has been proposed by introducing an auxiliary matrix, by which an artificial error vector is multiplied. The system was broken.
Evgenii A. Krouk +2 more
semanticscholar +1 more source
McEliece Cryptosystem: Reducing the Key Size with QC-LDPC codes
International Workshop on the Design of Reliable Communication Networks, 2023Post-quantum cryptography is a growing area since Shor showed that a quantum computer with enough qubits could be used to break the most widely used public-key cryptographic protocols today, such as RSA or those based on the discrete logarithm problem ...
Paula Pérez-Pacheco, P. Caballero-Gil
semanticscholar +1 more source
An Algebraic Attack Against McEliece-like Cryptosystems Based on BCH codes
Information Theory Workshop, 2023We present an algebraic attack on a McEliece-like scheme based on BCH codes (BCH-McEliece), where the Goppa code is replaced by a suitably permuted BCH code.
Freja Elbro, Christian Majenz
semanticscholar +1 more source
Cryptoanalysis McEliece-type cryptosystem based on correction of errors and erasures
arXiv.org, 2023Krouk, Tavernier and Kabatiansky proposed new variants of the McEliece cryptosystem. In this letter, it is shown that cryptosystem based on correction of errors erasures is equal to the Mc-Eliece cryptosystem with worse parametrs public key. It will also
Kirill Yackushenoks, Fedor Ivanov
semanticscholar +1 more source
Symphony of Speeds: Harmonizing Classic McEliece Cryptography With GPU Innovation
IEEE Transactions on Information Forensics and SecurityThe Classic McEliece key encapsulation mechanism (KEM), a candidate in the fourth-round post-quantum cryptography (PQC) standardization process by the National Institute of Standards and Technology (NIST), stands out for its conservative design and ...
Wen Wu +6 more
semanticscholar +1 more source

