Search Results - "code based cryptosystems"
-
1
Source: Radiotekhnika; No. 221 (2025): Радіотехніка; 46-50
Радиотехника; № 221 (2025): Радіотехніка; 46-50
Радіотехніка; № 221 (2025): Радіотехніка; 46-50Subject Terms: error-correcting coding, post-quantum cryptography, коди Гоппи, data integrity, Industrial Internet of Things, McEliece, постквантова криптографія, code-based cryptosystems, Goppa codes, промисловий Інтернет речей, кодові криптосистеми, IIoT, завадостійке кодування, цілісність даних
File Description: application/pdf
Access URL: http://rt.nure.ua/article/view/335695
-
2
Authors:
Source: 2021 IEEE International Conference on Quantum Computing and Engineering (QCE). :366-377
Subject Terms: Quantum cryptanalysis, post-quantum code-based cryptosystems, quantum circuit design, computer security
File Description: application/pdf
Access URL: http://xplorestaging.ieee.org/ielx7/9605247/9605263/09605274.pdf?arnumber=9605274
http://dblp.uni-trier.de/db/conf/qce/qce2021.html#PerrielloBP21
https://doi.org/10.1109/QCE52317.2021.00056
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=9605274
https://hdl.handle.net/11311/1201187
https://doi.org/10.1109/QCE52317.2021.00056 -
3
Authors: et al.
Source: Proceedings of the 17th International Joint Conference on e-Business and Telecommunications. :238-249
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, Bit-flipping Decoding, Code-based Cryptosystems, Decoding Failure Rate, LDPC Codes, MDPC Codes, Quasi-cyclic Codes, Post-quantum Cryptosystems, 02 engineering and technology
File Description: application/pdf
-
4
Authors: et al.
Source: 2019 26th IEEE International Conference on Electronics, Circuits and Systems (ICECS)
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, Post-quantum Cryptography, LEDAcrypt, Code-based Cryptosystems, FPGA Implementation
File Description: application/pdf
-
5
Authors: et al.
Contributors: et al.
Subject Terms: Bit-flipping decoding, Code-based cryptosystems, Decoding failure rate, LDPC codes, MDPC codes, Post-quantum cryptosystems, Quasi-cyclic codes, computer security
Relation: info:eu-repo/semantics/altIdentifier/isbn/978-3-030-90427-2; info:eu-repo/semantics/altIdentifier/isbn/978-3-030-90428-9; ispartofbook:Communications in Computer and Information Science; 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020; volume:1484; firstpage:151; lastpage:174; numberofpages:24; serie:COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE; http://hdl.handle.net/11311/1201190
-
6
Authors: et al.
Contributors: et al.
Subject Terms: Post-quantum Cryptosystems, Code-based Cryptosystems, Hardware Security
Relation: info:eu-repo/semantics/altIdentifier/isbn/979-8-3503-7394-3; info:eu-repo/semantics/altIdentifier/wos/WOS:001243879400041; ispartofbook:2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST); IEEE International Symposium on Hardware Oriented Security and Trust (HOST); firstpage:431; lastpage:441; numberofpages:11; https://hdl.handle.net/11311/1267242
-
7
Authors: et al.
Subject Terms: McEliece–Sidelnikov public key cryptosystem, McEliece public key cryptosystems, Reed-Muller codes, post-quantum cryptography, code-based cryptosystems
Relation: https://zenodo.org/records/14336092; oai:zenodo.org:14336092; https://doi.org/10.5281/zenodo.14336092
-
8
Authors: et al.
Contributors: et al.
Subject Terms: Code-based cryptosystems, cryptanalyis, post-quantum cryptography, QC-LDPC codes, statistical attacks
File Description: ELETTRONICO
Relation: info:eu-repo/semantics/altIdentifier/wos/WOS:000561335400005; volume:14; issue:3; firstpage:304; lastpage:312; numberofpages:9; journal:IET INFORMATION SECURITY; https://hdl.handle.net/11566/271987
-
9
Authors: et al.
Contributors: et al.
Subject Terms: asymmetric cryptosystems, code based cryptosystems, information set decoding, cryptography, computer security
File Description: STAMPA
Relation: info:eu-repo/semantics/altIdentifier/wos/WOS:000493522100005; volume:12; issue:10; firstpage:1; lastpage:35; numberofpages:35; journal:ALGORITHMS; http://hdl.handle.net/11311/1116861; https://doi.org/10.3390/a12100209
-
10
Authors: et al.
Subject Terms: Science & Technology, Technology, Computer Science, Theory & Methods, Engineering, Electrical & Electronic, BIKE, black-gray flip decoder, code-based cryptosystems, post-quantum cryptography, weak-key analysis, CRYPTOSYSTEMS, SECURITY, MDPC
-
11
Authors: et al.
Source: Ukrainian Information Security Research Journal; Vol. 18 No. 4 (2016); 269-275 ; Защита информации; Том 18 № 4 (2016); 269-275 ; Захист інформації; Том 18 № 4 (2016); 269-275 ; 2410-7840 ; 2221-5212
Subject Terms: code-Based Cryptosystems, post-quantum cryptography, UDC 004.056.55, криптосистемы на алгебраических кодах, постквантовая криптография, УДК 004.056.55, криптосистеми на алгебраїчних кодах, постквантова криптографія
File Description: application/pdf
Relation: https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088/14762; https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088/14763; https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088/14764; https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088
-
12
Authors: et al.
Contributors: et al.
Source: Post-Quantum Cryptography - PQCrypto 2013 ; https://hal.inria.fr/hal-00863598 ; Post-Quantum Cryptography - PQCrypto 2013, Jun 2013, Limoges, France. pp.203-216, ⟨10.1007/978-3-642-38616-9⟩
Subject Terms: code-based cryptosystems, quasi-dyadic codes, efficient algorithms, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: hal-00863598; https://hal.inria.fr/hal-00863598; https://hal.inria.fr/hal-00863598/document; https://hal.inria.fr/hal-00863598/file/codeqapp2.pdf
-
13
Authors: et al.
Contributors: et al.
Subject Terms: Code-based cryptosystems, LDPC codes, MDPC codes, reaction attacks, timing attacks
File Description: ELETTRONICO
Relation: info:eu-repo/semantics/altIdentifier/isbn/978-3-030-25921-1; info:eu-repo/semantics/altIdentifier/wos/WOS:000788008500007; ispartofseries:LNCS; ispartofbook:Proc. CBC 2019; 7th International Workshop on Code-Based Cryptography; volume:11666; firstpage:115; lastpage:136; numberofpages:22; https://hdl.handle.net/11566/269335
-
14
Authors: et al.
Contributors: et al.
Subject Terms: Cryptography, digital signature, code-based cryptosystems, FPGA implementation Resume
File Description: application/postscript
-
15
Authors: et al.
Contributors: et al.
Source: https://inria.hal.science/inria-00077045 ; [Research Report] RR-5158, LIP RR-2004-14, INRIA, LIP. 2004.
Subject Terms: FPGA IMPLEMENTATION, CODE-BASED CRYPTOSYSTEMS, DIGITAL SIGNATURE, CRYPTOGRAPHY, [INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]
-
16
Authors:
Contributors:
Subject Terms: Code-based cryptosystems, Courtois, Finiasz, and Sendrier (CFS) signature, McEliece cryptosystem, m-sequences, p-ary sequences, post-quantum cryptosystem, public key cryptography, puncturing, Reed-Muller (RM) codes, Weil bound, 621.3
File Description: application/pdf; 2552025 bytes
Relation: 000000151452; https://hdl.handle.net/10371/140697
Availability: https://hdl.handle.net/10371/140697
-
17
Authors: et al.
Subject Terms: Cryptography, Digital signature, Code-based cryptosystems, FPGA implementation
File Description: 2+8p; 314955 bytes; 23 bytes; application/pdf; application/octet-stream
Relation: LIP-RR - 2004-14; http://hdl.handle.net/2332/1006
Availability: http://hdl.handle.net/2332/1006
-
18
Source: Ukrainian Information Security Research Journal; Vol. 18 No. 4 (2016); 269-275; 2410-7840; 2221-5212
Index Terms: code-Based Cryptosystems, post-quantum cryptography, UDC 004.056.55, info:eu-repo/semantics/article, info:eu-repo/semantics/publishedVersion
URL:
https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088 https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088/14762 https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088/14763 https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088/14764 https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088/14762 https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088/14763 https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088/14764 -
19
Source: Ukrainian Information Security Research Journal; Vol. 18 No. 4 (2016); 269-275; 2410-7840; 2221-5212
Index Terms: code-Based Cryptosystems, post-quantum cryptography, UDC 004.056.55, info:eu-repo/semantics/article, info:eu-repo/semantics/publishedVersion
URL:
https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088 https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088/14762 https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088/14763 https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088/14764 https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088/14762 https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088/14763 https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088/14764
Nájsť tento článok vo Web of Science