Results 21 to 30 of about 8,486 (220)

Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages

open access: yesApplied Sciences, 2020
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC).
ByeongGyu Park   +4 more
doaj   +1 more source

Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography

open access: yesIET Information Security, Volume 17, Issue 2, Page 171-209, March 2023., 2023
Abstract In this survey, the authors review the main quantum algorithms for solving the computational problems that serve as hardness assumptions for cryptosystem. To this end, the authors consider both the currently most widely used classically secure cryptosystems, and the most promising candidates for post‐quantum secure cryptosystems.
J.‐F. Biasse   +4 more
wiley   +1 more source

Improved lattice enumeration algorithms by primal and dual reordering methods

open access: yesIET Information Security, Volume 17, Issue 1, Page 35-45, January 2023., 2023
Abstract The security of lattice‐based cryptosystems is generally based on the hardness of the Shortest Vector Problem (SVP). The original enumeration (ENUM) algorithm solving SVP runs in exponential time due to the exhaustive search, which is used as a subroutine for the block Korkin–Zolotarev (BKZ) algorithm.
Kazuki Yamamura   +2 more
wiley   +1 more source

A Primer on Underwater Quantum Key Distribution

open access: yesQuantum Engineering, Volume 2023, Issue 1, 2023., 2023
The growing importance of underwater networks (UNs) in mission‐critical activities at sea enforces the need for secure underwater communications (UCs). Classical encryption techniques can be used to achieve secure data exchange in UNs. However, the advent of quantum computing will pose threats to classical cryptography, thus challenging UCs. Currently,
Pietro Paglierani   +6 more
wiley   +1 more source

Key encapsulation mechanism based on polar codes

open access: yesIET Communications, Volume 16, Issue 20, Page 2438-2447, December 2022., 2022
Abstract This paper introduces a key encapsulation mechanism based on polar codes, called as KEM‐PC, with secure and efficient key generation, encapsulation and decapsulation algorithms. In the proposed KEM‐PC, the ephemeral public encapsulation and secret decapsulation keys, which are generated at each key exchange session, are employed.
Reza Hooshmand, Mahdi Khoshfekr
wiley   +1 more source

Wild McEliece [PDF]

open access: yes, 2011
The original McEliece cryptosystem uses length-$n$ codes over $\rm{F}_2$ with dimension $\geq n-mt$ efficiently correcting t errors where $2^m \geq n$. This paper presents a generalized cryptosystem that uses length-$n$ codes over small finite fields $\rm{F}_q$ with dimension $\geq n-m(q-1)t$ efficiently correcting $\lfloor qt/2 \rfloor$ errors where ...
Bernstein, D.J., Lange, T., Peters, C.P.
openaire   +3 more sources

Water Quality Classification for Inland Lakes and Ponds with Few Color Image Samples Based on Triple‐GAN and CSNN

open access: yesMathematical Problems in Engineering, Volume 2022, Issue 1, 2022., 2022
Water color is an important representation reflecting the characteristics of its quality in inland lakes or ponds; however, sufficient water color image samples are often difficult to obtain due to the limitation of fishery production. For few color image samples, the existing data enhancement methods based on the depth generation model have the ...
Zan Yang   +4 more
wiley   +1 more source

Noise Modulation‐Based Reversible Data Hiding with McEliece Encryption

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
McEliece cryptosystem is expected to be the next generation of the cryptographic algorithm due to its ability to resist quantum computing attacks. Few research studies have combined it with reversible data hiding in the encrypted domain (RDH‐ED). In this article, we analysed and proved that there is a redundancy in the McEliece encryption process that ...
Zexi Wang   +5 more
wiley   +1 more source

Crystals‐Dilithium on ARMv8

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Crystals‐Dilithium is one of the digital‐signature algorithms in NIST’s ongoing post‐quantum cryptography (PQC) standardization final round. Security and computational efficiency concerning software and hardware implementations are the primary criteria for PQC standardization.
Youngbeom Kim   +4 more
wiley   +1 more source

Reversible Data Hiding in Encrypted Domain Based on the Error‐Correction Redundancy of Encryption Process

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
The existing reversible data hiding methods in encrypted domain separate image encryption from information embedding and do not make full use of the redundant space in the process of image encryption. In order to improve the performance of reversible data hiding by using the technical characteristics of image encryption, a reversible data hiding method
Kong Yongjun   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy