Results 181 to 190 of about 8,486 (220)
Some of the next articles are maybe not open access.
2011
The wild McEliece cryptosystem uses wild Goppa codes over finite fields to achieve smaller public key sizes compared to the original McEliece cryptosystem at the same level of security against all attacks known. However, the cryptosystem drops one of the confidence-inspiring shields built into the original McEliece cryptosystem, namely a large pool of ...
Bernstein, D.J., Lange, T., Peters, C.P.
openaire +3 more sources
The wild McEliece cryptosystem uses wild Goppa codes over finite fields to achieve smaller public key sizes compared to the original McEliece cryptosystem at the same level of security against all attacks known. However, the cryptosystem drops one of the confidence-inspiring shields built into the original McEliece cryptosystem, namely a large pool of ...
Bernstein, D.J., Lange, T., Peters, C.P.
openaire +3 more sources
IEEE Transactions on Circuits and Systems Part 1: Regular Papers
Classic McEliece, with a remarkably stable security level, has been selected as one of the four key-establishment algorithms in the fourth-round evaluation of the post-quantum cryptography (PQC) standardization process of national institute of standards ...
Haochen Zhang +4 more
semanticscholar +1 more source
Classic McEliece, with a remarkably stable security level, has been selected as one of the four key-establishment algorithms in the fourth-round evaluation of the post-quantum cryptography (PQC) standardization process of national institute of standards ...
Haochen Zhang +4 more
semanticscholar +1 more source
A Decoder for a Lightweight McEliece Cryptosystem Based on Concatenated Codes
IEEE Consumer Electronics Magazine, 2023Large-scale quantum computers threaten the security of today's public-key cryptography. The McEliece cryptosystem is one of the most promising candidates for postquantum cryptography.
Johann-Philipp Thiers, J. Freudenberger
semanticscholar +1 more source
IACR Cryptology ePrint Archive
Classic McEliece was one of the code-based Key Encapsulation Mechanism finalists in the NIST post-quantum cryptography standardization process. Several key-recovery side-channel attacks on the decapsulation algorithm have already been published.
Nicolas Vallet +4 more
semanticscholar +1 more source
Classic McEliece was one of the code-based Key Encapsulation Mechanism finalists in the NIST post-quantum cryptography standardization process. Several key-recovery side-channel attacks on the decapsulation algorithm have already been published.
Nicolas Vallet +4 more
semanticscholar +1 more source
The McEliece Cryptosystem Based on the Redundant Residue Number System
Automation, Control, and Information TechnologyThis paper presents an improved McEliece cryptosystem based on the Redundant Residue Number System (RRNS). The proposed McEliece-RRNS scheme leverages the properties of RRNS–particularly efficient error correction and modular structures–to enhance ...
V. Yatskiv +5 more
semanticscholar +1 more source
Hardware Design of PQC Classic McEliece Finite Field Operations and Encryption Module
International Conference on Anti-counterfeiting, Security, and Identification, 2023The security of existing cryptosystems mostly relies on the difficulty of solving integer factorization problems and discrete logarithm problems. However, in recent years, with the rapid development of quantum computers, the time required to solve these ...
Yan Liu +6 more
semanticscholar +1 more source
Gradient Bit-Flipping Decoding for QC-MDPC McEliece PKC
2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan), 2023Strong and efficient cryptographic systems are crucial for secure consumer electronic devices. In this paper, we propose and evaluate a modification of bit-flipping decoding called gradient bit-flipping decoding, a decoding method for the QC-MDPC ...
Yusuke Iiyama, H. Kaneko
semanticscholar +1 more source
Implementation of A New Quasi-Cyclic Goppa Code in McEliece Cryptography
2023 IEEE 7th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), 2023Cryptography is fundamental in ensuring data privacy and security in the digital age. It provides the necessary tools and techniques for building trust and maintaining the confidentiality, integrity, and authenticity of data.
S. Carita, Herman Kabetta
semanticscholar +1 more source
2010
This paper shows that quantum information-set-decoding attacks are asymptotically much faster than non-quantum information-set-decoding attacks.
openaire +2 more sources
This paper shows that quantum information-set-decoding attacks are asymptotically much faster than non-quantum information-set-decoding attacks.
openaire +2 more sources
�������������� Goppa ������ ���� �������������������������� McEliece:
2011This thesis aims to study Goppa codes and their application to the McEliece cryptosystem. We begin by presenting some basic elements of Algebra, Theory of Error Correcting Codes, and Cryptography. Next, we introduce cyclic codes and a specific type of cyclic codes, BCH codes. Using the fundamental equation of BCH codes, we construct Goppa codes.
openaire +1 more source

