Results 11 to 20 of about 8,486 (220)

A new code‐based digital signature based on the McEliece cryptosystem

open access: yesIET Communications, 2023
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui   +2 more
doaj   +3 more sources

THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES

open access: yesSakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2011
Public-key cryptosystems form an important part of cryptography. In these systems, every user has a public and a private key. The public key allows other users to encrypt messages, which can only be decoded using the secret private key.
Vedat Şiap
doaj   +4 more sources

Unfolding Post-Quantum Cryptosystems: CRYSTALS-Dilithium, McEliece, BIKE, and HQC

open access: yesMathematics
The advent of quantum computers poses a significant threat to the security of classical cryptographic systems. To address this concern, researchers have been actively investigating the development of post-quantum cryptography, which aims to provide ...
Vaghawan Prasad Ojha   +3 more
doaj   +2 more sources

A Fuzzy Commitment Scheme with McEliece's Cipher [PDF]

open access: yesSurveys in Mathematics and its Applications, 2010
In this paper an attempt has been made to explain a fuzzy commitment scheme with McEliece scheme. The efficiency and security of this cryptosystem is comparatively better than any other cryptosystem.
Deo Brat Ojha, Ajay Sharma
doaj   +2 more sources

EFFECTIVE IMPLEMENTATION OF MODERN MCELIECE CRYPTOSYSTEM ON GENERALIZED (L, G)-CODES [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2020
Subject of Research. The paper presents the study of methods and approaches to implementation of the modern McEliece cryptosystem based on separable generalized (L, G)-codes. Method.
Ivan K. Noskov, Sergey V. Bezzateev
doaj   +1 more source

A new approach based on quadratic forms to attack the McEliece cryptosystem [PDF]

open access: yesIACR Cryptology ePrint Archive, 2023
We bring in here a novel algebraic approach for attacking the McEliece cryptosystem. It consists in introducing a subspace of matrices representing quadratic forms.
Alain Couvreur, Rocco Mora, J. Tillich
semanticscholar   +1 more source

Complete and Improved FPGA Implementation of Classic McEliece

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
We present the first specification-compliant constant-time FPGA implementation of the Classic McEliece cryptosystem from the third-round of NIST’s Post-Quantum Cryptography standardization process.
Po-Jen Chen   +6 more
doaj   +1 more source

A New Class of Q-Ary Codes for the McEliece Cryptosystem

open access: yesCryptography, 2021
The McEliece cryptosystem is a promising candidate for post-quantum public-key encryption. In this work, we propose q-ary codes over Gaussian integers for the McEliece system and a new channel model.
Jürgen Freudenberger   +1 more
doaj   +1 more source

MDPC-McEliece: New McEliece variants from Moderate Density Parity-Check codes [PDF]

open access: yes2013 IEEE International Symposium on Information Theory, 2013
In this work, we propose two McEliece variants: one from Moderate Density Parity-Check (MDPC) codes and another from quasi-cyclic MDPC codes. MDPC codes are LDPC codes of higher density (and worse error-correction capability) than what is usually adopted for telecommunication applications.
Misoczki, Rafael   +3 more
openaire   +2 more sources

An asymmetric cryptography using Gaussian integers

open access: yesEngineering and Applied Science Research, 2020
In this paper, the already strong McEliece cryptosystem is enhanced with atwo-dimensional finite Gaussian integer. By substituting the one-dimensional linear code with atwo-dimensional code employing afinite Gaussian integer, anew system ...
Wanarat Juraphanthong   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy