Results 51 to 60 of about 8,486 (220)

Tensor-based trapdoors for CVP and their application to public key cryptography [PDF]

open access: yes, 1999
We propose two trapdoors for the Closest-Vector-Problem in lattices (CVP) related to the lattice tensor product.
Fischlin, Roger, Seifert, Jean-Pierre
core   +2 more sources

A Centralized Key Management Scheme Based on McEliece PKC for Space Network

open access: yesIEEE Access, 2020
Constrained by the limited resource, high-latency and high bit error rate, the existing group key management schemes for the space network are inefficient. To solve this problem, we proposed a centralized and identity-based key management scheme by using
Jie Liu   +4 more
doaj   +1 more source

Secure and Efficient Code-Based Cryptography for Multi-Party Computation and Digital Signatures

open access: yesComputer Sciences & Mathematics Forum, 2023
Code-based cryptography is a promising candidate for post-quantum cryptography due to its strong security guarantees and efficient implementations. In this paper, we explore the use of code-based cryptography for multi-party computation and digital ...
Abdellatif Kichna, Abderrazak Farchane
doaj   +1 more source

AXI Hardware Accelerator for McEliece on FPGA Embedded Systems

open access: yesIEEE Transactions on Dependable and Secure Computing
This article presents a McEliece hardware accelerator designed to be attached to an AXI infrastructure, addressing the efficient implementation of a flexible post-quantum cryptoprocessor on FPGA-based embedded systems.
Enrique Cantó-Navarro   +1 more
semanticscholar   +1 more source

Hexi McEliece Public Key Cryptosystem [PDF]

open access: yesApplied Mathematics & Information Sciences, 2014
This paper introduces a new class of hexi codes namely, hexi polynomial codes, hexi Rank Distance codes, hexi Maximum Rank Distance codes, hexi Goppa codes and hexi wild Goppa codes. These codes are useful to create variants of the McEliece public key cryptosystem known as the hexi McEliece public key cryptosystem and its variants; these cryptosystems ...
K. Ilanthenral, K. S. Easwarakumar
openaire   +1 more source

PENERAPAN KODE REED SOLOMON PADA KRIPTOSISTEM MCELIECE

open access: yesFibonacci: Jurnal Pendidikan Matematika dan Matematika, 2023
Era modern ini, keamanan pesan dalam suatu transmisi tergolong lemah. Berbagai algoritme kriptosistem rentan dipecahkan oleh komputer kuantum yang mampu menyelesaikan perhitungan lebih cepat dibanding komputer konvensional.
Rizki Eka Oktavia   +2 more
semanticscholar   +1 more source

Cryptosystem Based on Induced Group Codes

open access: yesМоделирование и анализ информационных систем, 2016
The code C on a group G, induced by the code N on a subgroup H, has the property that for decoding the code C one can use the decoder for the code N.
V. M. Deundyak, Y. V. Kosolapov
doaj   +1 more source

Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE [PDF]

open access: yes, 2015
Lattice based encryption schemes and linear code based encryption schemes have received extensive attention in recent years since they have been considered as post-quantum candidate encryption schemes.
Wang, Yongge
core   +2 more sources

Do Not Let the Beginning Trap you! On Inhibition, Associative Creative Chains, and Hopfield Neural Networks

open access: yesThe Journal of Creative Behavior, Volume 59, Issue 2, June 2025.
ABSTRACT Creative thinking stems from the cognitive process that fosters the creation of new ideas and problem‐solving solutions. Artificial intelligence systems and neural network models can reduce the intricacy of understanding creative cognition. For instance, the generation of ideas could be symbolized as patterns of binary code in which clusters ...
Ronald Mtenga   +2 more
wiley   +1 more source

Analysis of reaction and timing attacks against cryptosystems based on sparse parity-check codes

open access: yes, 2019
In this paper we study reaction and timing attacks against cryptosystems based on sparse parity-check codes, which encompass low-density parity-check (LDPC) codes and moderate-density parity-check (MDPC) codes.
A Becker   +16 more
core   +1 more source

Home - About - Disclaimer - Privacy