Results 91 to 100 of about 2,437 (198)

Codes in Dihedral Group Algebra

open access: yesМоделирование и анализ информационных систем, 2018
Robert McEliece developed an asymmetric encryption algorithm based on the use of binary Goppa codes in 1978 and no effective key attacks has been described yet.
Kirill V. Vedenev, Vladimir M. Deundyak
doaj   +1 more source

Improving the efficiency of the LDPC code-based McEliece cryptosystem through irregular codes

open access: yes, 2013
We consider the framework of the McEliece cryptosystem based on LDPC codes, which is a promising post-quantum alternative to classical public key cryptosystems.
Baldi, Marco   +3 more
core   +1 more source

Cryptographical Properties of Ising Spin Systems

open access: yes, 2000
The relation between Ising spin systems and public-key cryptography is investigated using methods of statistical physics. The insight gained from the analysis is used for devising a matrix-based cryptosystem whereby the ciphertext comprises products of ...
B. Derrida   +19 more
core   +1 more source

On the McEliece Public-Key Cryptosystem [PDF]

open access: yes, 1990
Based on an idea by Hin, the method of obtaining the original message after selecting k of n coordinates at random in the McEliece public-key cryptosystem is improved. The attack, which is more efficient than the attacks previously proposed, is characterized by a systematic method of checking and by a random bit swapping procedure.
openaire   +1 more source

Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups [PDF]

open access: yes, 2014
The main practical limitation of the McEliece public-key encryption scheme is probably the size of its key. A famous trend to overcome this issue is to focus on subclasses of alternant/Goppa codes with a non trivial automorphism group. Such codes display
de Portzamparc, Frédéric   +4 more
core   +2 more sources

Efficient ASIC Architecture for Low Latency Classic McEliece Decoding

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Post-quantum cryptography addresses the increasing threat that quantum computing poses to modern communication systems. Among the available “quantum-resistant” systems, the Classic McEliece key encapsulation mechanism (KEM) is positioned as a ...
Daniel Fallnich   +3 more
doaj   +1 more source

A Summary of McEliece-Type Cryptosystems and their Security

open access: yesJournal of Mathematical Cryptology, 2007
In this paper we give an overview of some of the cryptographic applications which were derived from the proposal of R. J. McEliece to use error correcting codes for cryptographic purposes.
Engelbert D., Overbeck R., Schmidt A.
doaj   +1 more source

Structural Properties of Twisted Reed-Solomon Codes with Applications to Cryptography

open access: yes, 2018
We present a generalisation of Twisted Reed-Solomon codes containing a new large class of MDS codes. We prove that the code class contains a large subfamily that is closed under duality.
Beelen, Peter   +3 more
core   +1 more source

A Distinguisher-Based Attack on a Variant of McEliece's Cryptosystem Based on Reed-Solomon Codes

open access: yes, 2012
Baldi et \textit{al.} proposed a variant of McEliece's cryptosystem. The main idea is to replace its permutation matrix by adding to it a rank 1 matrix.
Gauthier, Valérie   +2 more
core   +1 more source

Further Generalisations of Twisted Gabidulin Codes [PDF]

open access: yes, 2017
We present a new family of maximum rank distance (MRD) codes. The new class contains codes that are neither equivalent to a generalised Gabidulin nor to a twisted Gabidulin code, the only two known general constructions of linear MRD codes.Comment: 10 ...
Nielsen, Johan Rosenkilde né   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy