Results 31 to 40 of about 86 (81)

Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Rei Ueno   +5 more
doaj   +1 more source

Strengthening McEliece Cryptosystem [PDF]

open access: yes, 2000
McEliece cryptosystem is a public-key cryptosystem based on error-correcting codes. It constitutes one of the few alternatives to cryptosystems relying on number theory. We present a modification of the McEliece cryptosystem which strengthens its security without increasing the size of the public key.
openaire   +1 more source

Joint QKD-Post-Quantum Cryptosystems

open access: yesIEEE Access, 2020
To extend the transmission distance and/or improve secret-key rate of QKD protocols, we propose to employ the joint QKD-post-quantum cryptosystems in which QKD is used for raw-key transmission while the post-quantum cryptography (PQC) subsystem to ...
Ivan B. Djordjevic
doaj   +1 more source

Code-Based Key Encapsulation from McEliece’s Cryptosystem [PDF]

open access: yes, 2017
In this paper we show that it is possible to extend the framework of Persichetti's code-based framework and create a secure KEM based on the McEliece protocol. This provides greater flexibility in the application of coding theory as a basis for cryptographic purposes.
openaire   +2 more sources

Cryptanalysis of McEliece’s Public-Key Cryptosystem [PDF]

open access: yes, 2007
An approach is proposed for the cryptanalysis of the well-known version of McEliece's public-key cryptosystem that is based on a new iterative optimization algorithm for decoding an arbitrary linear code. The algorithm provides guaranteed correction of all error patterns with Hamming weight less than d/2, where d is the minimum distance of the code ...
Valery I. Korzhik, Andrey I. Turkin
openaire   +1 more source

Selecting parameters for secure McEliece-based cryptosystems [PDF]

open access: yesInternational Journal of Information Security, 2012
In 1994, Shor showed that quantum computers will be able to break cryptosystems based on the problems of integer factorization and the discrete logarithm, for example, RSA or ECC. Code-based cryptosystems are promising alternatives to public-key schemes built on these problems, and they are believed to be secure against quantum computer attacks.
Robert Niebuhr   +3 more
openaire   +1 more source

MSB BASED IMAGE STEGANOGRAPHY USING MCELIECE CRYPTOSYSTEM

open access: yesMINAR International Journal of Applied Sciences and Technology, 2021
Steganography is the science of embedding secret data inside data so they can be sent to destination security. Encryption algorithms used to save information from sly activities when sent from one device to another over the wireless network. In this paper McEliece will be used to text encryption by Goppa code, where McEliece cryptosystem is a public ...
Hayder Abdulkudhur MOHAMMED   +1 more
openaire   +1 more source

Secure and Compact: A New Variant of McEliece Cryptosystem

open access: yesIEEE Access
This paper introduces a variant of the McEliece cryptosystem and employs the $(C_{1}, C_{1} + C_{2})$ -construction to generate a new code from two arbitrary linear codes. We propose an efficient hard-decision decoding algorithm for linear codes derived
Ekta Bindal, Abhay Kumar Singh
doaj   +1 more source

A Fuzzy Commitment Scheme with McEliece's Cipher [PDF]

open access: yesSurveys in Mathematics and its Applications, 2010
In this paper an attempt has been made to explain a fuzzy commitment scheme with McEliece scheme. The efficiency and security of this cryptosystem is comparatively better than any other cryptosystem.
Deo Brat Ojha, Ajay Sharma
doaj  

Twisted Hermitian Codes

open access: yesMathematics, 2020
We define a family of codes called twisted Hermitian codes, which are based on Hermitian codes and inspired by the twisted Reed–Solomon codes described by Beelen, Puchinger, and Nielsen. We demonstrate that these new codes can have high-dimensional Schur
Austin Allen   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy