Results 81 to 90 of about 8,486 (220)

Permutation LDPC codes in McEliece cryptosystem [PDF]

open access: yesAIP Conference Proceedings, 2019
This paper gives a first glance at McEliece cryptosystem using permutation Low Density Parity Check (LDPC) code as its private and public keys.
null Irwansyah   +2 more
openaire   +1 more source

Post-Quantum Authentication Framework Based on Iris Recognition and Homomorphic Encryption

open access: yesIEEE Access
This paper proposes an authentication protocol based on post-quantum cryptography and iris recognition. The process uses a modified version of the original McEliece cryptographic algorithm that provides post-quantum security.
Mariano Lopez-Garcia   +1 more
doaj   +1 more source

Evaluation of Nearshore and Offshore Water Quality Assessment Using UAV Multispectral Imagery

open access: yesRemote Sensing, 2020
A cost-effective technology has emerged which combines multispectral sensors mounted on Unmanned Aerial Vehicles (UAVs). This technology has a promising potential for monitoring water quality in coastal environments.
Ryan McEliece   +3 more
doaj   +1 more source

On the security of digital signature schemes based on error-correcting codes [PDF]

open access: yes, 2003
We discuss the security of digital signature schemes based on error-correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to explain why the Xinmei scheme failed, such as the linearity of the signature and the ...
Doumen, Jeroen   +2 more
core   +3 more sources

Denk Kodlar Arasındaki Permütasyonu Bulmak

open access: yesDüzce Üniversitesi Bilim ve Teknoloji Dergisi, 2014
McEliece sistemi [1] gibi bazı şifreleme sistemlerinde denk kodlar kullanılmaktadır ve bu sistemlerin güvenliği verilen iki kodun denk olup olmadığının tespitine ve eğer denk iseler aralarındaki permütasyonun bulunmasının zorluğuna dayanmaktadır [2].
Ekrem EMRE
doaj   +6 more sources

Joint QKD-Post-Quantum Cryptosystems

open access: yesIEEE Access, 2020
To extend the transmission distance and/or improve secret-key rate of QKD protocols, we propose to employ the joint QKD-post-quantum cryptosystems in which QKD is used for raw-key transmission while the post-quantum cryptography (PQC) subsystem to ...
Ivan B. Djordjevic
doaj   +1 more source

New algorithms for decoding in the rank metric and an attack on the LRPC cryptosystem

open access: yes, 2015
We consider the decoding problem or the problem of finding low weight codewords for rank metric codes. We show how additional information about the codeword we want to find under the form of certain linear combinations of the entries of the codeword ...
Hauteville, Adrien, Tillich, Jean-Pierre
core   +3 more sources

A Summary of McEliece-Type Cryptosystems and their Security

open access: yesJournal of Mathematical Cryptology, 2007
In this paper we give an overview of some of the cryptographic applications which were derived from the proposal of R. J. McEliece to use error correcting codes for cryptographic purposes.
Engelbert D., Overbeck R., Schmidt A.
doaj   +1 more source

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM [PDF]

open access: yes, 2017
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation.
Barreto, Paulo S. L. M.   +4 more
core   +1 more source

Code-Based Key Encapsulation from McEliece’s Cryptosystem [PDF]

open access: yes, 2017
In this paper we show that it is possible to extend the framework of Persichetti's code-based framework and create a secure KEM based on the McEliece protocol. This provides greater flexibility in the application of coding theory as a basis for cryptographic purposes.
openaire   +2 more sources

Home - About - Disclaimer - Privacy