Results 51 to 60 of about 8,486 (220)
Tensor-based trapdoors for CVP and their application to public key cryptography [PDF]
We propose two trapdoors for the Closest-Vector-Problem in lattices (CVP) related to the lattice tensor product.
Fischlin, Roger, Seifert, Jean-Pierre
core +2 more sources
A Centralized Key Management Scheme Based on McEliece PKC for Space Network
Constrained by the limited resource, high-latency and high bit error rate, the existing group key management schemes for the space network are inefficient. To solve this problem, we proposed a centralized and identity-based key management scheme by using
Jie Liu +4 more
doaj +1 more source
Secure and Efficient Code-Based Cryptography for Multi-Party Computation and Digital Signatures
Code-based cryptography is a promising candidate for post-quantum cryptography due to its strong security guarantees and efficient implementations. In this paper, we explore the use of code-based cryptography for multi-party computation and digital ...
Abdellatif Kichna, Abderrazak Farchane
doaj +1 more source
AXI Hardware Accelerator for McEliece on FPGA Embedded Systems
This article presents a McEliece hardware accelerator designed to be attached to an AXI infrastructure, addressing the efficient implementation of a flexible post-quantum cryptoprocessor on FPGA-based embedded systems.
Enrique Cantó-Navarro +1 more
semanticscholar +1 more source
Hexi McEliece Public Key Cryptosystem [PDF]
This paper introduces a new class of hexi codes namely, hexi polynomial codes, hexi Rank Distance codes, hexi Maximum Rank Distance codes, hexi Goppa codes and hexi wild Goppa codes. These codes are useful to create variants of the McEliece public key cryptosystem known as the hexi McEliece public key cryptosystem and its variants; these cryptosystems ...
K. Ilanthenral, K. S. Easwarakumar
openaire +1 more source
PENERAPAN KODE REED SOLOMON PADA KRIPTOSISTEM MCELIECE
Era modern ini, keamanan pesan dalam suatu transmisi tergolong lemah. Berbagai algoritme kriptosistem rentan dipecahkan oleh komputer kuantum yang mampu menyelesaikan perhitungan lebih cepat dibanding komputer konvensional.
Rizki Eka Oktavia +2 more
semanticscholar +1 more source
Cryptosystem Based on Induced Group Codes
The code C on a group G, induced by the code N on a subgroup H, has the property that for decoding the code C one can use the decoder for the code N.
V. M. Deundyak, Y. V. Kosolapov
doaj +1 more source
Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE [PDF]
Lattice based encryption schemes and linear code based encryption schemes have received extensive attention in recent years since they have been considered as post-quantum candidate encryption schemes.
Wang, Yongge
core +2 more sources
ABSTRACT Creative thinking stems from the cognitive process that fosters the creation of new ideas and problem‐solving solutions. Artificial intelligence systems and neural network models can reduce the intricacy of understanding creative cognition. For instance, the generation of ideas could be symbolized as patterns of binary code in which clusters ...
Ronald Mtenga +2 more
wiley +1 more source
Analysis of reaction and timing attacks against cryptosystems based on sparse parity-check codes
In this paper we study reaction and timing attacks against cryptosystems based on sparse parity-check codes, which encompass low-density parity-check (LDPC) codes and moderate-density parity-check (MDPC) codes.
A Becker +16 more
core +1 more source

